Information Security all in one place!

Posts tagged “cyber criminals

Mobile Devices and the Growing Concern

A pile of mobile devices including smart phone...

If you use any type of mobile device in your day to day life….keep reading. Ignorance can only bring you so far!

Two separate studies of mobile devices have found serious privacy and security issues. One of the studies found that smartphones and tablet PCs can be eavesdropped on when they are being used to make purchases, conduct online banking transactions, or access VPNs (virtual private networks). Another study uncovered a number of ways to break into Apple’s iOS, its operating system for mobile devices. It is likely that cyber criminals will increasingly turn to mobile devices in their attacks as the devices become more and more commonplace in business transactions.

Related Information:

Proof of Concept Video:


Data, Laws, Cyber-Weapons Biggest Threats to Information Security

This is one of the best articles coming out of the RSA Conference 2012 that I have read online so far. Take the time to read through the article, coming to a head in the article what some are calling “Cyber-Warfare” and “Big Data“. Simply put, the article explains the three biggest threats in Information Security for 2012 and what to expect in the news in the near future.

  1. Data – Big Data, Big Companies
  2. Laws – Government Regulations and Internet Monitoring
  3. Cyber-Weapons – Cyber Warfare

This article pushes my beliefs on what Anonymous is doing is wrong – (let’s be honest we all teeter on the fence). Reading through the article,  you will gather that governments are scared and want to take control of the internet. Anonymous in my opinion is fueling this fear and they are setting themselves up for failure of their own beliefs. The governments from around the world are going to regulate the internet, then we will see a change and they not going to be able to push back as easily. And Information Security is going to boom!

Data, Laws, Cyber-Weapons Biggest Threats to Information Security

Posted on Sunday Mar 4th 2012 by Fahmida Y. Rashid.

The three biggest information security risks in 2012 are the rise of big data, ill-conceived regulations and the prospect of cyber-war, a prominent security expert told attendees at the 2012 RSA Conference.

The people who are taking advantage of technology to further their own business models threaten the Internet, Bruce Schneier, a renowned security expert and CTO of British Telecomm, said in a presentation at the RSA Conference in San Francisco Feb. 28. His talk was in stark contrast to the majority of the speakers at this year’s conference, who focused on cyber-criminals, terrorists and hacktivists.

Just as the tobacco industry is called Big Tobacco and energy giants are called Big Oil, Schneier sees some of the larger Web companies becoming part of Big Data.

“I think the rise of Big Data is as important a threat in the coming years, one we should really look at start taking seriously,” Schneier told his audience.

The shift toward looking at user data as a commodity is inevitable as storing cheap becomes less and less expensive, said Schneier. Companies such as Apple, Amazon and Google are basing their businesses on the prospect of monetizing user data, such as photos, documents, video, search history, shopping behavior and other online activity.

“It’s easy and cheaper to search than sort,” said Schneier.

Data is no longer being kept separate, but aggregated so that users can be shown targeted ads or directed to customized services, said Schneier. Advertising is only just one way data can be collected, aggregated and monetized. Organizations can assess credit-worthiness, evaluate employees or even take the step toward linking with government or other legal data.

The risks to security arise because users have to relinquish control over their data. “Feudal security” refers to what happens when users have to depend on a company to safeguard their private data. Big Data cares about making money from advertisers. IT or user privacy are not priorities.

Users aren’t just relinquishing control over their data, Schneier said, noting that smartphones and portable devices are also restricted in what the user could do with them.

For example, Apple doesn’t give users the same access control on the iPhone that it does on its computer. “I can’t do things as a security professional on my iPhone,” said Schneier.

“Ill-conceived regulations from law enforcement” is the second biggest risk, according to Schneier. While law enforcement and legislators are operating with an “honest desire” to make the Internet safer to use, the laws they create introduce a host of new problems. Legislators are listening to law enforcement requests to pass laws that allow eavesdropping to catch cyber-criminals. These kinds of laws do not make the Internet more secure for the vast majority of users.

“Mostly, what they propose is dumb,” said Schneier.

Read More Here:

Will new Laws help in CyberCrime?

English: Podcast or podcasting icon Français :...

Image via Wikipedia

Kaspersky Lab E-Store
NetSecurityIT- PodCast

A rash of new legislation aims to protect consumers and businesses from cybercrime, but do these laws make a difference? This edition of The Malware Report podcast explores the approaches that cybercrime legislation take to the problem and what further steps can be taken.

Podcast I came across and found it valuable enough to share. Enjoy!

Kaspersky Anti-Virus 09'

Related articles