IT Security Memos ❖✔
153 views | +0 today
Your new post is loading...
Your new post is loading...
Rescooped by Simone Maga from IT Security Unplugged
Scoop.it!

Could You Survive a Cyberattack?

Could You Survive a Cyberattack? | IT Security Memos ❖✔ | Scoop.it

The lawsuits that often follow a cyberattack can be just as devastating as the attack itself. Cyberrisk insurance could help.


Via IT Security Unplugged
more...
No comment yet.
Rescooped by Simone Maga from The Political Side of Things
Scoop.it!

Android phones can be hacked with a text, security firm says

Android phones can be hacked with a text, security firm says | IT Security Memos ❖✔ | Scoop.it
Security firm says hackers could steal personal data off millions of Android phones with a sneaky text message

Via Ken Feltman
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

RBI proposes IT subsidiary, beefing up cyber security in banking sector - Vancouver Desi

Benaulim (Goa), May 14 (IANS) -- Banking could play second fiddle to Information Technology (IT) in the near future and the RBI is thinking about starting an IT subsidiary, which will help the apex banking regulator to develop policy as well as...
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

Passwords: You're doing it wrong. Here's how to make them uncrackable.

Passwords: You're doing it wrong. Here's how to make them uncrackable. | IT Security Memos ❖✔ | Scoop.it
For years now I've harangued relatives about their shoddy password practices. Either they use easily-hacked passwords or forget the passwords they've created--sometimes both.
more...
No comment yet.
Rescooped by Simone Maga from Shahriyar Gourgi
Scoop.it!

Internet of Things - Privacy and Security issues

Yesterday Pierluigi Paganini, CISO Bit4Id and founder Security Affairs, presented at the ISACA Roma & OWASP Italy conference the state of the art for the Inter…

Via shahriyar Gourgi
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

Major Bash Vulnerability Affects Linux, UNIX, Mac OS X

Major Bash Vulnerability Affects Linux, UNIX, Mac OS X | IT Security Memos ❖✔ | Scoop.it
A critical remote code execution vulnerability in Bash, present in almost all Linux, UNIX and Mac OS X deployments, has been discovered. Experts advise immediate patching.
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

Adobe, Microsoft Push Critical Security Fixes - Krebs on Security

Adobe, Microsoft Push Critical Security Fixes - Krebs on Security | IT Security Memos ❖✔ | Scoop.it
Adobe, Microsoft Push Critical Security Fixes
Krebs on Security
Adobe and Microsoft today each independently released security updates to fix critical problems with their products.
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

Banking Malware: Sophistication Rises In Longtime Botnet Families | CRN

Banking Malware: Sophistication Rises In Longtime Botnet Families | CRN | IT Security Memos ❖✔ | Scoop.it
Zeus, Gameover and other banking Trojans are designed to steal account credentials, spoof web pages and manipulate transactions to drain accounts. Here are eight of the most notorious families.
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

| Parliamo delle frodi del 2020. E di altro

| Parliamo delle frodi del 2020. E di altro | IT Security Memos ❖✔ | Scoop.it
Simone Maga's insight:

Titolo: "Parliamo delle frodi del 2020. E di altro."

 

Abstract: I due temi, quello della frode e quello della sicurezza, si intersecano in più punti, ma come ben sanno gli addetti ai lavori sono ben lontani dal sovrapporsi completamente. La Oracle Community for Security, dedica questo appuntamento annuale a presentare la sua ultima pubblicazione “Le Frodi nella Rete” (che sarà disponibile dopo la presentazione qui: c4s.clusit.it insieme alle sei precedenti) proprio su questo tema. Lo faremo in una nutrita e dinamica tavola rotonda dove gli esperti di sicurezza e di frodi del gruppo di lavoro racconteranno la loro esperienza e spiegheranno il loro punto di vista. Parliamo di tecnologia ICT usata dai buoni (per il contrasto), dai cattivi (per frodare) e dagli inconsapevoli (che non chiudono le finestre), e quindi di frodi, reati, sicurezza, insicurezza, contromisure e organizzazione. In generale e nelle industry: telecomunicazioni, banche, assicurazioni, gaming, settore pubblico e sanità. Pagamenti online, mobile, carte, proprietà intellettuale e contraffazione… Un appuntamento da non perdere!

 

Modera: Alessandro Vallega

 

Partecipano: Riccardo Abeti, Orlando Arena, Luca Bechelli, Giancarlo Butti, Elisabetta Calmasini, Paolo Carcano, Enrico Ferretti, Sergio Fumagalli, Luca Lora Lamia , Simone Maga, Paola Meroni, Mario Monitillo,  Nicola Murano, Roberto Obialero, Maurizio Pastore, Claudio Telmon, Enrico Toso.

more...
No comment yet.
Rescooped by Simone Maga from market research reports forum
Scoop.it!

Enterprise Fraud Management Market Size, Market Trends Challenges, Key Vendors and Opportunities for 201

TechNavio’s analysts forecast the Global Enterprise Fraud Management market to grow at a CAGR of 7.93 percent over the period 2013-2018. One of the key factors contributing to this market growth...

Via mary garcia
more...
mary garcia's curator insight, February 17, 2014 11:39 AM

Analysts forecast the Global Enterprise Fraud Management market to grow at a CAGR of 7.93 percent over the period 2013-2018. One of the key factors contributing to this market growth is the need for detection of frauds in organizations. The Global Enterprise Fraud Management market has also been witnessing the rise in demand from SMEs. However, the high cost of implementation could pose a challenge to the growth of this market.

Global Enterprise Fraud Management 2014-2018, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market in the Americas, and the EMEA and APAC regions; it also covers the Global Enterprise Fraud Management market landscape and its growth prospects in the coming years. The report also includes a discussion of the key vendors operating in this market.

Key vendors dominating this space are Fidelity National Information Services, Fair Isaac Corp., NICE Actimize, and SAS Institute Inc.

Other vendors mentioned in the report are ACI Worldwide Inc., Aquilan Technologies Inc., BAE Systems plc, CA Technologies, CyberSource Corp., EastNets.com, Experian, Fiserv Inc., Fortel Analytics, FairWarning Inc., Memento, Norkom Technologies, Oracle Corp., Tonbeller, and Verafin.

 

Complete Report is Available @ http://www.sandlerresearch.org/global-enterprise-fraud-management-market-2014-2018.html

Rescooped by Simone Maga from Cyber Security & Digital Forensics
Scoop.it!

Vulnerability Risk Management: Metrics that Matter - Speaking of Security ..

Vulnerability Risk Management: Metrics that Matter - Speaking of Security .. | IT Security Memos ❖✔ | Scoop.it
In my previous blogs (Vulnerability Risk Management: Let’s not boil the Ocean and Vulnerability Risk Management - It is a Big Deal) in this series, I focused on how important Vulnerability Risk Management is for organizations and the need to take...

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

Neverquest Trojan: Built to Steal from Hundreds of Banks | We use ...

Neverquest Trojan: Built to Steal from Hundreds of Banks | We use ... | IT Security Memos ❖✔ | Scoop.it
It makes it quite impossible for the bank to distinguish legitimate users from criminals. Kaspersky Lab announced earlier this week that the trojan has infected thousands of user-machines but – as malware expert Sergey ...
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

IT Security and Risk Management: An overview - APT

IT Security and Risk Management: An overview - APT | IT Security Memos ❖✔ | Scoop.it
IT Security and Risk Management: An overview ZDNet In the past, enterprise security was all about circling the wagons and making sure you only had friendly folks on the inside: firewalls, intrusion prevention systems (IPS) and secure email/web...
more...
No comment yet.
Rescooped by Simone Maga from SME Cyber Security
Scoop.it!

Know the cyberrisks to thwart them | cyber security caucus

Know the cyberrisks to thwart them | cyber security caucus | IT Security Memos ❖✔ | Scoop.it

Via Institute for Critical Infrastructure Technology, Roger Smith
Simone Maga's insight:

“Bad actors or hackers often look to individuals’ devices — from computers to smartphones and tablets — as a way into larger networks,” Mr. Warrene points out.

While a social media account can be hacked, of greater concern is the way the breach may potentially provide access to the device that is used by its owner to enter and use the social media account.

Access to the device can possibly lead to hacks into business networks, causing the leak of confidential data or, worse, infect many other systems on that network.

more...
Roger Smith's curator insight, March 23, 2015 8:58 PM

“Bad actors or hackers often look to individuals’ devices — from computers to smartphones and tablets — as a way into larger networks,” Mr. Warrene points out.

While a social media account can be hacked, of greater concern is the way the breach may potentially provide access to the device that is used by its owner to enter and use the social media account.

Access to the device can possibly lead to hacks into business networks, causing the leak of confidential data or, worse, infect many other systems on that network.

Scooped by Simone Maga
Scoop.it!

Thoughts on online payments, banking and security

We asked a few experts and experienced users their opinions on online banks, payments and security. Here's what they had to say.
more...
No comment yet.
Rescooped by Simone Maga from JWT WOW
Scoop.it!

Motorola phones could soon use electronic tattoos to identify users

Motorola phones could soon use electronic tattoos to identify users | IT Security Memos ❖✔ | Scoop.it

Motorola is sitting on the technology that could allow its phone users to forgo passwords to access their phone, and instead be identified by an electronic tattoo attached to their skin.

 

Speaking at the D11 conference in California, Motorola chief executive Dennis Woodside said that the tattoos have been developed by engineering firm MC10, and contain flexible electronic circuits that are attached to the wearer's skin using a rubber stamp.


Via JWT_WOW
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

Mobile security advances, but threats still loo...

Mobile security advances, but threats still loo... | IT Security Memos ❖✔ | Scoop.it
While mobile payments security is improving – a trend that has not gone unnoticed by payments professionals or consumers – with even more enhancements on the horizon, the number of breaches could still increase before the situation improves.
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

Microsoft Releases Emergency Security Update - Krebs on Security

Microsoft Releases Emergency Security Update - Krebs on Security | IT Security Memos ❖✔ | Scoop.it
Microsoft Releases Emergency Security Update Krebs on Security Microsoft today deviated from its regular pattern of releasing security updates on the second Tuesday of each month, pushing out an emergency patch to plug a security hole in all...
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

IBM buys cloud security provider Lighthouse - ZDNet

IBM buys cloud security provider Lighthouse - ZDNet | IT Security Memos ❖✔ | Scoop.it
Gigaom IBM buys cloud security provider Lighthouse ZDNet With this acquisition, IBM provides a unique identity and access management offering that combines proven software and analytics technology with expert managed services that make it easy for...
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

eBay Security Breach Delivers 10 Lessons for Enterprise IT Executives

eBay Security Breach Delivers 10 Lessons for Enterprise IT Executives | IT Security Memos ❖✔ | Scoop.it
The eBay breach, the latest in a long list of security woes at large enterprises, should teach us a lot about security—or the general lack of it—across the Web.
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

Beltway Poll: Area reacts in light of security breaches - WTOP

Beltway Poll: Area reacts in light of security breaches - WTOP | IT Security Memos ❖✔ | Scoop.it
WTOP Beltway Poll: Area reacts in light of security breaches WTOP The latest WTOP Beltway Poll takes a close look at two privacy concerns: security breaches that jeopardize personal and financial information, and federal government surveillance...
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

10 Early Warning Signs of Business Fraud

10 Early Warning Signs of Business Fraud | IT Security Memos ❖✔ | Scoop.it

Bill Trueman, CEO of UKFraud.co.uk, said: "My first question is always to ask executives ‘do you really know how safe your own organisation is? Some do reply confidently. Most do not. Fraud can happen anywhere, anytime, but it is relatively straightforward to deter or discover at an early stage with the right systems and procedures in place.

Anti-fraud consultancy has published a list of 10 common early warning signs that could alert management that fraud may be occurring in their organisation.

 

1. Erratic reporting

Erratic, incomplete, late or excuse laden management reporting is often a classic sign that something is wrong. 

Action: Insist on up-to-date reporting, within a set timetable and then build this into the internal GRC (Governance Risk and Compliance) systems.

 

2. Apparent process laziness

A weakening of anti-fraud and data security systems can happen naturally, over time, and is normal – especially when things get busy. 

Action: Make sure you implement the suggestions of your internal compliance managers and organise appropriate training to reinforce attitudes and practise.

 

3. Organisational change and the desire to dump data

An excuse of, “oh I’m sorry those files were destroyed” should be cause for alarm. 

Action: Take care to establish and log where paper documents are and when they should and should not be stored.

 

4. Data inconsistencies or absence in the archives

Whether it is archive data or cross reference checks that are missing or wrong, factual inconsistencies will also occur naturally. 

Action: Make sure that all files are electronically stored, with appropriate back-ups as part of your compliance systems and that no-one has the access to any files that include a DELETE capability.

 

5. Audit-time delays: Excuses, confusion or wild goose chases when disclosing to auditors, be they internal or external, can be a telltale sign too. 

Action: Ensure that everyone treats audits as important and make sure that they are completed on time and properly, and with appropriate audit skills.

 

6. Behavioural anomalies

Research shows that internal fraudsters are most likely to be either ‘youngsters who cut across the processes and systems’ or ‘middle aged executives with the authority and a gripe.' 

Action: Get HR more closely involved.

 

7. Gossip-mongers in overdrive

Staff whispers and rumours “that all is not right” should always be taken seriously. 

Action: Listen, take all such rumours seriously and investigate the reality.

 

8. Twitchy non-execs

When non-execs' comfort factor ‘goes south’ or when they have a ‘bee in the bonnet’ about something that does not add up or make sense, they often have good reason to worry. So must you.

Action: If non-execs have concerns about particular issues, one should fund their thinking by allowing them to bring in the appropriate specialist experts that can investigate matters more deeply.

 

9. Unofficial IT work

Technical staff working around the enterprise conducting unsupervised IT activity, often outside normal hours can also be a worrying sign, both from a risk and a cost perspective.

Action: Do the IT security staff look and think further than just password expiry issues? ...

 

10. Scapegoating

The fraudster’s hope is that should the balloon go up the scapegoat takes the blame, at least long enough for records to be destroyed and evidence removed.

Action: Make sure that you have strong and cascaded accountabilities.

more...
No comment yet.
Rescooped by Simone Maga from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

How Dexter Steals Credit Card Information

How Dexter Steals Credit Card Information | IT Security Memos ❖✔ | Scoop.it
Real Time Network Protection

Via Sebastien Gioria, Frederic GOUTH
more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

Study Looks at Risks of the Internet of Things -ISACA | Inventrium

Study Looks at Risks of the Internet of Things -ISACA | Inventrium | IT Security Memos ❖✔ | Scoop.it
... consumers are conflicted about the trade-offs among privacy, security and convenience factors, according to new research from ISACA, a global association of IT security, assurance, governance and risk professionals.
Simone Maga's insight:

Data Security & Trends and Predictions

more...
No comment yet.
Scooped by Simone Maga
Scoop.it!

New malware poses threat to online banking -

New malware poses threat to online banking - | IT Security Memos ❖✔ | Scoop.it
Kaspersky Lab has identified a new malicious program capable of attacking the online banking systems across the world. The new threat Neverquest Trojan banker is claimed to bypass online banking security systems like the ...
Simone Maga's insight:

The Trend Micro’s Q3 2013 Security Roundup Report identified over 200,000 infections in the quarter ending September.

more...
No comment yet.