Your nearest and dearest are snooping on your phone

If you needed one more reason for protecting your phone with a passcode or fingerprint, here it is: there’s a good chance that one or more of the people close to you have snooped on it in the last year. A group of researchers from University of British Columbia and University of Lisbon have polled 1,381 users via Amazon’s Mechanical Turk, and the results they gathered have shown that: 31% of participants looked through someone … More Continue reading Your nearest and dearest are snooping on your phone

Rise of Darknet Stokes Fear of The Insider

With the proliferation of shadowy black markets on the so-called “darknet” — hidden crime bazaars that can only be accessed through special software that obscures one’s true location online — it has never been easier for disgruntled employees to harm their current or former employer. At least, this is the fear driving a growing stable of companies seeking technical solutions to detect would-be insiders. Continue reading Rise of Darknet Stokes Fear of The Insider

Insider Breach: T-Mobile Czech Employee Steals and Sells 1.5 Million Users Data

T-Mobile is the latest in the list of recent high-profile data breaches, though this time the breach is not carried out by “Peace” – the Russian hacker who was behind the massive breaches in some popular social media sites including LinkedIn, MySpace, … Continue reading Insider Breach: T-Mobile Czech Employee Steals and Sells 1.5 Million Users Data

Insider Threats, Industrial Sabotage and Game Theory

Insider threats can achieve industrial sabotage by slowly gaining control over individual projects, programs and then eventually the company.

The post Insider Threats, Industrial Sabotage and Game Theory appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory

The InfoSecond, Week of May 30: Ransomware Targeting Amazon Users, Preventing Hacks and More!

This week’s InfoSecond is packed with the latest security news, including a ransomware attack on Amazon users and tips for preventing a social media hack.

The post The InfoSecond, Week of May 30: Ransomware Targeting Amazon Users, Preventing Hacks and More! appeared first on Security Intelligence.

Continue reading The InfoSecond, Week of May 30: Ransomware Targeting Amazon Users, Preventing Hacks and More!

Organizations unprepared for employee-caused security incidents

While employee-related security risks are the number-one concern for security professionals, organizations are not taking adequate steps to prevent negligent employee behavior, according to a new Ponemon Institute study. The study, Managing Insider Risk Through Training & Culture, asked more than 600 individuals at companies that currently have a data protection and privacy training program to weigh in on the topic of negligent and malicious employee behaviors, as well as the consequences of poor security … More Continue reading Organizations unprepared for employee-caused security incidents

Behavior is the new authentication: A look into the future

In the next few years organizations will face extreme IT security challenges. Hackers are targeting humans instead of machines. All the most costly cyber attacks (APTs, ransomware) are a result of employees or third party providers’ privilege misuse, and executing a social engineering attack is easier than finding zero days. Traditional pattern-based perimeter defense tools, password-based authentication, user access control solutions are necessary but missing a trick when it comes to the detection of privileged … More Continue reading Behavior is the new authentication: A look into the future

Verizon’s 2016 DBIR: Humans Remain the Weakest Link

The Verizon 2016 DBIR revealed that many established attack vectors are still effective. Organizations need to embrace possible security solutions.

The post Verizon’s 2016 DBIR: Humans Remain the Weakest Link appeared first on Security Intelligence.

Continue reading Verizon’s 2016 DBIR: Humans Remain the Weakest Link