Collaborative Information Site

User Profile @jaxonlaurantus

follow: RSS


jaxonlaurantus's Posts

Online Fraud Detection - Planning for Tomorrow’s Cyberattacks

As organisations think through their cybersecurity strategy for the coming year the challenge they face is how to plan for success, writes Peter Bauer, CEO and co-founder of Mimecast.

This past year we’ve seen how cybercriminals continue to become more sophisticated and insidious by constantly revising, updating and re-inventing their tactics and technologies to launch attacks. We’ve seen our share of DDoS attacks, key political figures emails hacked, and ransomware attacks. Recently, we saw cybercriminals target the San Francisco Municipal Transportation Authority with a ransomware attack. Free rides for all! And, that wasn’t San Francisco offering an early holiday gift to locals.

 

Knowing 100% protection against today’s cyber threats is not realistic – cyber resilience becomes the name of the game.  Building a cyber resilience strategy that layers state-of-the-art preventative systems, point-in-time recovery measures, and a means to maintain continuity during an attack can make a

continue reading
1 visits |0 Comments|Reply

What’s Behind Google’s Secretive Ad-Blocking Policy by Online Security

When Google decided in May to stop accepting online ads for short-term, ultra-high-cost personal loans known as payday loans, some people wondered whether the company was acting more like a publisher exercising editorial control than a supposedly neutral search engine.

 

Now that Google’s policy has gone into effect, it’s worth asking: To what extent should the company be a gatekeeper, judging which online ads are okay and which are not? And if the world’s largest Internet search engine is going to be selective about accepting ads, where does it draw the line?

 

The same questions could be applied to Microsoft and Yahoo, which refuse to carry ads for certain types of sensitive content (but still advertise payday loans). Baidu, the world’s second-largest search engine, has been grappling with these issues since earlier this year, when its practice of promoting medical listings without vetting them sparked outrage over a tragedy: a young man with cancer died after receiving an ineffe

continue reading
2 visits |0 Comments|Reply

Online Security: Apple urges iPhone users to update after powerful cyberweapon is found

SAN FRANCISCO – Apple on Friday urged iPhone owners to install a security update after a sophisticated attack on an Emirati dissident exposed vulnerabilities targeted by malware dealers.

Researchers at the Lookout mobile security firm and Citizen Lab at the University of Toronto said they had uncovered a three-pronged attack targeting the dissident’s phone “that subverts even Apple’s strong security environment.”

 

Lookout and Citizen Lab worked with Apple on an iOS patch to defend against the attack, called Trident because of its triad of methods, the researchers said in a joint blog post.

“We were made aware of this vulnerability and immediately fixed it with iOS 9.3.5,” Apple said in a released statement.

 

Trident is used in spyware referred to as Pegasus, which a Citizen Lab investigation showed was made by an Israel-based organization called NSO Group. NSO was acquired by the U.S. firm Francisco Partners Management six years ago.

Lookout referred to Pegasus as the most sop

continue reading
3 visits |0 Comments|Reply

Online Security: Which? files supercomplaint against banks over transfer fraud

Banks may face formal inquiry into whether they can refuse to reimburse victims conned into transferring money into fraudsters’ accounts

 

UK banks should do more to protect customers tricked into transferring money to fraudsters, according to a consumer body that has lodged a “supercomplaint” with financial regulators. The move by Which? means banks could now face a formal investigation into whether they can continue refusing to reimburse victims.

 

The organisation submitted its first supercomplaint this year in the same week that official data revealed that fraud in the UK payments industry had soared by 53% as criminals develop increasingly sophisticated tactics to steal bank customers’ cash.

 

Which? said banks should “shoulder more responsibility” when someone is conned into transferring money to another person’s account, just as they reimburse customers who lose money due to scams involving debit and credit cards or fraudulent account activity.

 

 

Some customers have l

continue reading
4 visits |0 Comments|Reply

Business Email Compromise – Top Phishing Attacks of 2016 by Oakmere Road

In this series of blog posts we examine the most common forms of phishing attacks and appropriate countermeasures to protect both individuals and organizations – in this post we explore Business Email Compromise and the potential fall-out for executives.

 

Business Email Compromise

 

At the start of 2016, the FBI warned that it had seen a 270% increase in CEO scams, also known as Business Email Compromise (BEC) scams.

 

 

With these scams, savvy cyber criminals are taking the time to harvest personal information and learn the processes within a company. Once armed with this information, they target carefully selected employees with a spear phishing email designed to get access to confidential business information or transfer money into an unknown account.

continue reading
5 visits |0 Comments|Reply
[]