A.I. Talking Points–Security Week Review


Is not easy to make a summon of what happened in this crazy market every week. Not because there are not enough arguments to explore but, in effect, because there are too much.
So let try to find a way to summarize what I’ve found relevant.

Mobile security isn’t just for geeks

Although many still does not think about mobile security as a real problem in nowadays business, people should try to think better at the actual landscape. 
Let’s focus on some main points that also this week have been clearly exposed by news: mobile means a lot of different things smartphones, phones, tablets, laptop and other weird devices.
And security means to protect data, communications, privacy and confidentiality.
So what we have had here is the exposure of private data taken from hacked communication devices. As for the case of Scarlett Johansson or for the Rupert Murdoch’s News of the World hacking scandal there is a common line: those devices must to be protected, and anyone is at risk of exposure.
Of course other risks comes out related to the explosion of malware in modern devices, so the old threats that used to be related with PC are now transferred to “any device, anywhere” so Be careful when searching Heidi Klum online .
Financial malware is one of the best pieces, it can run on your device while you do our home banking and have your data steeled…

Big banks and Companies are in trouble, hack is waiting out there (…do they realize this?)

From “bitcoin” to “fireeye” malware is spreading, and even Stuxnet and Zeus are coming back. Report says that cyber criminal activities costs billion to our suffering economy, but targets are widely underestimating risks, approach to security is still based on a traditional approach that not take in count the different landscape. But evidences shows us that everything changed those last years.  Just to make it clear should the last hacking to defense companies all over the world (think of Mitsubishi one just to name one of the latest) and the consequences as Diginotar bankruptcy make our mind clear?

Four kind of guys with the same weapons

Cyberterrorims, Cyberwarfare, Cyber Activism and Cyber criminality are 4 aspect of the same medal (but…how many faces they have?)
People with different skills, target and motivation seems to act accordingly. the truth is that they just use the same weapons and sometimes they have the same target but with very different reasons. Different reasons means also different practices, so while cyber activists choose “political” targets , cyber terrorists (or patriots depend the side you’re on, think of Comodo hacker who claims hacked Diginotar) follow a different agenda. But being target of different groups with different needs should make us think about what we have to protect in a different way.  Change the rules would be a better way to play

Related articles
  • FBI investigating hacking of celebrities | InSecurity Complex – CNET … (portadiferro2.blogspot.com)
  • Fake Certificates Reveal Flaws in the Internet’s Security (portadiferro2.blogspot.com)
  • Anti-virus firms push security software for mobile devices (usatoday.com)
  • Scarlett Johansson Hacked! 5 Must-Read Mobile Safety Tips (self.com)
  • Despite “Year of the hack,” risky security behavior common … (portadiferro2.blogspot.com)
  • [Mobile Security App Shootout, Part 12] Webroot Mobile Security … (portadiferro2.blogspot.com)
  • Hollywood-Grade Mobile Phone Security: 4 Tips (informationweek.com)
  • Researchers Hack Mobile Data Communications and other web security news (portadiferro2.blogspot.com)
  • Italian researcher finds more SCADA holes (portadiferro2.blogspot.com)
  • Enterprise Risk Management Hosts Mobile Device Security Event for ‘On the Move Professionals’ (prweb.com)
  • Damaka Introduces World’s First Mobile Client for Microsoft Office 365™ (prweb.com)
  • Analysis: The Desktop OS May Be Dying, Not the Desktop (readwriteweb.com)
  • Forrester: More than half of enterprises support consumer phones (gigaom.com)
  • Organizations Over-Confident About Security Strategy: Survey (portadiferro2.blogspot.com)
  • Trend Micro unveils next-gen mobile security solution for Android (intomobile.com)
  • Lenovo IdeaPad K1 Tablet Price in India and Specs – Dual Core Android 3.1 Tablet (priceofmobiles.wordpress.com)
  • Review: JoikuSpot Premium (allaboutsymbian.com)
  • Kensington Announces Some Great New Accessories (geardiary.com)
  • [Mobile Security App Shootout, Part 14] ESET Mobile Security RC Still In Development, Offers Strong Features Nonetheless (androidpolice.com)
  • Have You Tried Mobile Blogging to Your Groups? (casasugar.com)
  • Telmetrics Launches Ground-Breaking Mobile Call Tracking Solution Exclusively for Mobile Local Search Publishers and App Developers (prweb.com)
  • Casa Beta: FluffyCo Eco Mobiles (casasugar.com)
  • Mobile Manners: Dropped call (zdnet.com)
  • Millennials and Mobile (outwardmediablog.wordpress.com)
  • Free Webinar: Mobile Marketing for the Hospitality Industry (mathieson.typepad.com)
  • Android malware outsmarts bank security, steals accounts – Security … (portadiferro2.blogspot.com)
  • The Evolution of Malware | SecurityWeek.Com (portadiferro2.blogspot.com)
  • New DroidDream Variant Has Ability To Fight Off Other Malware … (portadiferro2.blogspot.com)
  • Infographic: Two Decades of Malware (portadiferro2.blogspot.com)
  • Nuclear warheads could be next Stuxnet target: Check Point (portadiferro2.blogspot.com)
  • Clarke: Outdated cyber defense leaves US open to attack (portadiferro2.blogspot.com)
  • Advanced Malware, Targeted Attacks Compromise Enterprises via … (portadiferro2.blogspot.com)
  • Android malware steals bank account details (portadiferro2.blogspot.com)
  • Why Diginotar may turn out more important than Stuxnet Securelist (portadiferro2.blogspot.com)
  • Cyber criminals targeting mobile devices (premierlinedirect.co.uk)
  • Take It from The Stars: Stop Your Phone from Being Hacked (mylookout.com)
  • 5 Ways To Fight Mobile Malware (informationweek.com)
  • Mobile Security With a Data Mining Solution: Lookout Releases API for App Stores (readwriteweb.com)
  • Mobile malware criminal command-and-control activity (portadiferro2.blogspot.com)
  • Missile and submarine secrets ‘may have been stolen’ in cyber attack on … (portadiferro2.blogspot.com)
  • Mitsubishi Heavy: No defense information hacked (portadiferro2.blogspot.com)
  • Cyber-espionage hits defence companies (portadiferro2.blogspot.com)
  • Military Contractor Mitsubishi Heavy Hit By Hack Attack (portadiferro2.blogspot.com)
  • Spam relating to #DigiNotar certificates is detected (portadiferro2.blogspot.com)
  • ComodoHacker Declares Private Cyber-War (portadiferro2.blogspot.com)
  • A Post Mortem on the Iranian DigiNotar Attack (portadiferro2.blogspot.com)
  • Debacle deepens for hacked SSL certificates issuer (portadiferro2.blogspot.com)
  • Comodo hacker claims credit for DigiNotar attack (portadiferro2.blogspot.com)

To the official site of Related Posts via Taxonomies.

CC BY-NC-SA 4.0 A.I. Talking Points–Security Week Review by The Puchi Herald Magazine is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.