Category Archives: Uncategorised

images

UK has world’s highest rate of cyber attacks via email

A recent report by anti-virus and IT security firm Symantec has found that the UK has the world’s highest rate of malicious email traffic designed to carry out cyber attacks on users and businesses. Detailed in their 2015 Internet Security Threat Report, Symantec found that in the year of 2014, 1 email in every 79 sent to UK businesses were designed to maliciously hack their IT systems. This represented a 61% increase from 2013 and a rate over twice as high as the nearest country, Saudi Arabia. Malicious emails can use social engineering or malware embedded in the message to trick administrators into handing over access to business data such as customer information or commercial accounts. The report clearly demonstrates the high level of risk posed to UK businesses, particularly those who do not have the IT resources to effectively screen malicious emails as well as spam. Without adequate protection and risk assessment, it is clear that the financial and operating risks to UK businesses are only increasing.
Read the full report at https://www.symantec.com/security_response/publications/threatreport.jsp
cybercrime

Chinese hacking group undetected for a decade

The specialist IT cyber security firm FireEye released today the findings of an investigation into a China-based hacking group that has been working undetected for over a decade. The group has been named as ‘APT30’, short for ‘advanced persistent threat’, and has targeting Southeast Asia-based businesses and government departments in order to break into their networks and steal confidential documents. The group is suspected of working from within Chinese government intelligence. What is especially interesting is that the group is using high-sophisticated software designed to steal documents from computers disconnected from the internet (also known as an ‘air gap’) and moving the files to internet-connected computers so they can be uploaded back to the attackers. While this group represents the state of the art in cyber attacks, it is only a matter of time before cyber criminals copy these techniques and use them to target businesses for profit.

Read the fascinating report in full at FireEye:

https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf

internet-things

‘Internet of Things’ raises new cyber risks for businesses

Specialist computer security firm Veracode has warned businesses that new internet-linked devices like thermostats and security cameras often do not have security built-in, making it easier for hackers or cyber criminals to break into their IT systems or spy on their premises. Nicknamed the ‘Internet of Things’, the new generation of business products are linked to an internet connection, giving business owners the convinience of accessing them outside the network. However, Veracode has studied six popular devices used by businesses and consumers and found them vulnerable. For example, the Ubi light system, which allows users to turn off lights at premises remotely, can be used by criminals to work out when a premises is most likely to be empty and unguarded. They also discovered vulnerabilities that would allow a hacker to install spyware into installed devices. The report demonstrates how the potential benefits of new ways to connect businesses to IT systems also come with new risks.
Read the full article from Computer Business Review at:
http://www.cbronline.com/news/internet-of-things/consumer/veracode-warns-iot-a-pathway-for-cybercrime-4548343

Uk Government: Cyber Insurance “essential” for growing UK businesses

The UK Government’s Cabinet Office, in conjunction with major London insurers, released a landmark report today on how cyber insurance is essential for growing UK businesses. Cyber crime is the fastest growing risk for small businesses today, and the report shows how seriously the government is taking the problem of not enough businesses taking out cyber insurance cover. The report noted the SMEs face the highest risk of cyber crime; in one example, a small brokering business was targeted by a phishing email scam, and over £100,000 was stolen from customer accounts in ten days.
One of the major benefits of cyber insurance noted by the report was by putting SMEs with professional guidance and advice on cyber risk. Having an insurance product not only provides firms with access to cover, but also gives them access to the latest insight in how to avoid business losses in the first place. There are many aspects of cyber risk that insurers already have wide experience of tackling; for example, business interruption or brand damage. Insurance can also provide SMEs with specialist services that they will not realistically have access to themselves, such as IT security equipment or PR damage mitigation.
The report also noted that 22% of SMEs reported that they ‘didn’t know where to start’ with their firms cyber security; basically, that they knew their firm was vulnerable but had no idea of how to address it. Cyber insurance offers the best possible way for SMEs to secure their businesses and their risks are being addressed.
Get a quote today from us and see how it easy it is to protect your business from the huge costs inflicted by cyber crime.
Read the report in full here: http://ow.ly/KFLI7

US intelligence agencies caught trying to break security of Microsoft and Apple products

New documents leaked by Edward Snowden to the media have revealed that US intelligence agencies have tried to crack the data encryption systems used by Apple and Microsoft operating systems to keep hard drives secure from thieves. Researchers at the CIA have also sought to create a modified version of the developer tools used to create iPhone and iPad apps to steal passwords and data from phones. This story demonstrates how even the most trusted IT companies are constantly having their products probed for weaknesses, and that no aspect of your businesses IT is 100% secure.
Read the full story here:
https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/