Distributed Archives - IT Security Guru https://www.itsecurityguru.org/tag/distributed/ The Site for our Community Wed, 05 Dec 2018 13:46:32 +0000 en-US hourly 1 https://www.itsecurityguru.org/wp-content/uploads/2019/12/cropped-Guru_Transparent-PNG-1-32x32.png Distributed Archives - IT Security Guru https://www.itsecurityguru.org/tag/distributed/ 32 32 MWR InfoSecurity Suggests 2016 will be Dramatically Impacted by Smart Technology https://www.itsecurityguru.org/2015/12/15/mwr-infosecurity-suggests-2016-will-be-dramatically-impacted-by-smart-technology/?utm_source=rss&utm_medium=rss&utm_campaign=mwr-infosecurity-suggests-2016-will-be-dramatically-impacted-by-smart-technology Tue, 15 Dec 2015 11:05:32 +0000 http://www.itsecurityguru.org/?p=13910 As we prepare to close the book on 2015, no will argue that it’s not been eventful, particularly for IT practitioners. For a number of years, experts have been talking about how ‘smart’ technology will impact the way we live with the promise of spectacular functionality in the technology we utilise. With that in mind, […]

The post MWR InfoSecurity Suggests 2016 will be Dramatically Impacted by Smart Technology appeared first on IT Security Guru.

]]>
As we prepare to close the book on 2015, no will argue that it’s not been eventful, particularly for IT practitioners. For a number of years, experts have been talking about how ‘smart’ technology will impact the way we live with the promise of spectacular functionality in the technology we utilise.
With that in mind, experts at MWR InfoSecurity have offered the following insights to what 2016 may have in store for us.
The devices we use:
Statistics suggest that, by the end of 2016, 4.8 billion people will be using smartphones. This will have a significant impact on the global economy, with mobile transactions expected to power about $1 trillion in spending in the USA alone.
Nick Walker, Head of Mobile Security at MWR explains, “In 2016, UK mobile ad spending is set to exceed the spending of TV advertising, demonstrating a marked change in focus, and showing the heavy adoption of the smart phone in e-commerce. Accompanying this, the wearables market is drastically increasing in popularity with devices providing functionality, such as health monitoring and exercise tracking or even acting as a smart wallet – not just another way to read your SMS messages or a fashion accessory.
“With the drastic increase in functionality, and the continued growth of e-commerce and advertising in the mobile space, it is almost certain that user’s mobile handsets will be a greater target for attackers. As such, businesses developing applications for these platforms will need to account for the increasing levels of risk with a thorough security policy and testing regime.”
The Vehicles we Drive:
Robert Miller – Head of Smart Energy at MWR InfoSecurity, outlines, “Smart Cars may conjure images of Google’s self-driving car, but there are a whole host of new technologies being added to our vehicles. From tracking of freight through to controlling our car’s heating from our smart phone, many companies are looking to technology to add value and services to their current offerings as a way of standing out from their competition.
“One key area in smart vehicles is telemetrics – the data taken from vehicles about how they are operating sent remotely to third parties. Insurance companies are very keen to harness this data as it not only allows them to reward drivers who stick to the speed limits, but also gives them a ‘black box’ to potentially detect insurance fraud. Several European countries are leading the way on using this technology, so given their early success I predict we’ll see this added to vehicles as standard very soon – perhaps even the next twelve months, or at the very least being offered as an optional component when purchasing a new motor.”
The places we live:
Robert continues, “Smart Cities almost seems like a cliché from several years ago where we were promised that ability to monitor everything from pipe leaks to car park spaces in real time. The goal of course was that with this information could be managed more effectively and reduce costs to councils. A key factor that has slowed down this revolution has been the need to connect the many thousands of low powered components safely without spending thousands of pounds on cabling or installing huge mesh networks that can guarantee connectivity.
“In 2015 we have seen companies try to bridge the gap by offering new technologies that can provide this connectivity, such as SIGFOX. Far from waiting for organisations to buy in to this technology, SIGFOX are following a ‘build it and they will come’ mantra. This means that in many cities a wireless network is already available that companies can simply plug their devices into. With the entry cost dramatically reduced, I would expect to see more and more companies seize this opportunity to bring IoT and smart city products to market.”
The dilemma smart brings:
Where there’s money to be made there’s nefarious individuals looking to capitalise and, unfortunately, smart technology has the potential to be a veritable gold mine.
Robert concludes, “The Increase in uptake of telemetrics and smart city solutions will increase the value of exploits against these systems. Whereas before, technologies were only being used to monitor our fridges or control street lights, the same technology is now being used to monitor and control a building’s security and a city’s infrastructure. Many organisations are applying IT security to these systems rather than Industrial security. The key difference is that with Industrial systems, availability is king. Cryptolocker for IoT is feasible but the thing stopping this from being realised is the current lack of value for such an attack. When Smart Cities and connected cars truly take off, attackers will be sure to follow.”
 
To find out more about MWR InfoSecurity, visit their website: https://www.mwrinfosecurity.com/

The post MWR InfoSecurity Suggests 2016 will be Dramatically Impacted by Smart Technology appeared first on IT Security Guru.

]]>
You’re the Weakest Link, Goodbye! https://www.itsecurityguru.org/2015/11/26/youre-the-weakest-link-goodbye/?utm_source=rss&utm_medium=rss&utm_campaign=youre-the-weakest-link-goodbye Thu, 26 Nov 2015 10:23:42 +0000 http://www.itsecurityguru.org/?p=13637 The use of third parties is unavoidable in today’s global economy. The growing use of third party suppliers and business partners, whilst bringing significant business advantages, also exposes organisations to substantial risk, such as financial loss, reputational damage, regulatory prosecution and fines from major breaches of security. In the last few years we’ve witnessed many […]

The post You’re the Weakest Link, Goodbye! appeared first on IT Security Guru.

]]>
The use of third parties is unavoidable in today’s global economy. The growing use of third party suppliers and business partners, whilst bringing significant business advantages, also exposes organisations to substantial risk, such as financial loss, reputational damage, regulatory prosecution and fines from major breaches of security. In the last few years we’ve witnessed many of these risks being realised; examples have included major breaches of security and costs to recover escalating into millions of dollars, as a result of the third party supplier being comprised. Changes in regulation, the evolving threat landscape and policy changes globally further complicate matters, generating further risk and expense for business.
Despite considerable efforts from many industries to address these issues, it remains difficult to manage. As well as the risks described, companies perceived as the ‘weakest link’ in the supply chain could end up not having third party contracts renewed. These challenges are discussed in more detail, and some suggestions put forward to help tackle the increasing burden on teams and risk mitigation strategies.
 
VIEW IT HERE: https://www.brighttalk.com/webcast/11399/179581

The post You’re the Weakest Link, Goodbye! appeared first on IT Security Guru.

]]>
Anonymous Attacks Websites of Two Japanese Airports https://www.itsecurityguru.org/2015/10/20/anonymous-attacks-websites-of-two-japanese-airports/?utm_source=rss&utm_medium=rss&utm_campaign=anonymous-attacks-websites-of-two-japanese-airports Tue, 20 Oct 2015 09:21:40 +0000 http://www.itsecurityguru.org/?p=13098 Anonymous has launched DDoS attacks on two Japanese airport services’ websites as a protest against the dolphin hunting industry. Narita and Chubu, two airports in the east of Japan, found both their websites targeted. No flights were affected, however the sites themselves were out of action for around 8 hours. The attack was part of […]

The post Anonymous Attacks Websites of Two Japanese Airports appeared first on IT Security Guru.

]]>
Anonymous has launched DDoS attacks on two Japanese airport services’ websites as a protest against the dolphin hunting industry. Narita and Chubu, two airports in the east of Japan, found both their websites targeted.
No flights were affected, however the sites themselves were out of action for around 8 hours. The attack was part of a campaign known as #OpKillingBay, a campaign by Anonymous against the hunting of dolphins – an issue that also attracts dissent from animal rights groups, who cite the methods used as inhumane.
 
view full story here
SOURCE: Max Metzger, writing for SC Magazine

The post Anonymous Attacks Websites of Two Japanese Airports appeared first on IT Security Guru.

]]>
Casinos Brought Down in Cyber Attack https://www.itsecurityguru.org/2015/07/08/casinos-brought-down-in-cyber-attack/?utm_source=rss&utm_medium=rss&utm_campaign=casinos-brought-down-in-cyber-attack Wed, 08 Jul 2015 10:45:59 +0000 http://www.itsecurityguru.org/?p=11581 Casinos in New Jersey were taken offline for 30 minutes and threatened with further disruption unless a bitcoin ransom is paid. More on this story and others at www.itsecurityguru.org @IT_SecGuru

The post Casinos Brought Down in Cyber Attack appeared first on IT Security Guru.

]]>
Casinos in New Jersey were taken offline for 30 minutes and threatened with further disruption unless a bitcoin ransom is paid.
More on this story and others at www.itsecurityguru.org
@IT_SecGuru

The post Casinos Brought Down in Cyber Attack appeared first on IT Security Guru.

]]>