{"id":1006,"date":"2015-03-24T00:00:00","date_gmt":"2015-03-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2015\/03\/24\/newsalert-2015-mar-23\/"},"modified":"2021-12-30T11:38:35","modified_gmt":"2021-12-30T11:38:35","slug":"newsalert-2015-mar-23","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2015\/03\/24\/newsalert-2015-mar-23\/","title":{"rendered":"Newsalert &#8211; 2015 Mar 23"},"content":{"rendered":"<p>Data company [IDT911] to open European HQ in Galway<br \/>\nA company that offers data protection services is to create 60 jobs with the opening of its European headquarters in Galway.<br \/>\nThe company provides identity management, fraud monitoring and cyber security services to 17.5 million private customers in the US and Canada as well as to more than 750,000 businesses.<br \/>\nLink: http:\/\/www.rte.ie\/news\/2015\/0323\/689013-jobs-galway\/ <\/p>\n<p>Is the UK gaining on the US in its spate of major cyber security breaches?<br \/>\nThe data breach landscape in the UK has changed beyond all recognition over the last few years. More than four in ten Britons (42%) have been affected in some way by a breach, and their levels of concern are growing.<br \/>\nExperian has recently completed a new paper, Data Breach Readiness 2.0: The \u2018Customer First\u2019 Data Breach Response, which assessed the rapidly changing landscape of data breach in the UK. Not only did we survey businesses and consumers we also spoke, at some length, with industry authorities from leading lawyers, insurers, digital forensic experts, customer support specialists and crisis communications experts to assess the true extent of preparedness among UK organisations should a data breach occur.<br \/>\nCosts are higher also: The average US data breach costs \u00a3132 per record compared with \u00a3104 in the UK; and lastly lost business costs are higher in the US, reaching \u00a32.2 million on average, compared with less than \u00a31 million in the UK.<br \/>\nLink: http:\/\/www.information-age.com\/industry\/uk-industry\/123459208\/uk-gaining-us-its-spate-major-cyber-security-breaches <\/p>\n<p>PoSeidon malware targeting retailers, say researchers<br \/>\nA family of improved malware is targeting retailers\u2019 point of sale (PoS) systems, taking up where Zeus and BlackPoS left off, say Cisco researchers.<br \/>\nDubbed PoSeidon, the malware is designed to scrape PoS devices\u2019 memory for credit card information and exfiltrate that data to servers. The data can be used to create cloned credit cards, and is typically sold on criminal markets. The demand for such data has driven the growth in the number of data breaches involving PoS malware.<br \/>\nLink: http:\/\/www.computerweekly.com\/news\/2240242818\/PoSeidon-malware-targeting-retailers-say-researchers <\/p>\n<p>Bridging the Cyber-Security Skills Gap Using the Right Technology<br \/>\nAccording to the 2015 Global Cybersecurity Status Report from industry association, ISACA, a huge 90% and 87% of US- and UK-based IT and security professionals respectively testified to there being an international shortage of skilled cyber-security professionals, with direct impact on these organizations\u2019 ability to prepare and fend off sophisticated attack as a result.<br \/>\nThe technology is moving in the right direction, we just need to make sure it will focus on helping the humans fight the bots and the malicious humans on the other side, not burry them in additional labor.<br \/>\nLink: http:\/\/www.cytegic.com\/Blog\/?p=160 <\/p>\n<p>CEOs have false perception of the extent of their cyber risk insurance cover, new report finds<br \/>\nThe report on the role of insurance in managing and mitigating cyber risk (32-page \/ 2.78MB PDF) highlighted a discrepancy between the cover that chief executives believe their companies have for cyber risk and the reality of the insurance protection their businesses have purchased.<br \/>\n&#8220;Business leaders who are aware of insurance solutions for cyber tend to overestimate the extent to which they are covered,&#8221; the report said. &#8220;Surveys show that 52% of CEOs believe that they have cover, whereas in fact less than 10% do. This picture is likely a result of the complexity of insurance policies with respect to cyber, with cyber sometimes included, sometimes excluded, and sometimes covered as part of an add-on policy.&#8221;<br \/>\nAccording to the report, just 2% of large businesses in the UK have &#8220;explicit cyber cover&#8221; and approximately half of the businesses the government liaised with for the report said they were not aware &#8220;that cyber risks can even be insured&#8221;.<br \/>\nLink: http:\/\/www.out-law.com\/en\/articles\/2015\/march\/ceos-have-false-perception-of-the-extent-of-their-cyber-risk-insurance-cover-new-report-finds\/ <\/p>\n<p>Adobe Flash Player Sees Additional Update, Patches Vulnerabilities Found at Pwn2Own Contest<br \/>\nThe latest beta version of Adobe Flash Player is now available. It is version number 17.0.0.134, and is the latest free version of the player. This version of Adobe Flash Player comes with many new incremental updates and performance enhancements that increase the quality of the player. Most of the fixes are technical in nature, but many users will see some performance enhancements if they spend a lot of time using Adobe Flash Player.<br \/>\nLink: http:\/\/airherald.com\/adobe-flash-player-sees-additional-update-patches-vulnerabilities-found-at-pwn2own-contest\/23470\/ <\/p>\n<p>Communication Security Establishment&#8217;s cyberwarfare toolbox revealed<br \/>\nThe CSE toolbox includes the ability to redirect someone to a fake website, create unrest by pretending to be another government or hacker, and siphon classified information out of computer networks, according to experts who viewed the documents.<br \/>\nLink: http:\/\/www.cbc.ca\/news\/canada\/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978?cmp=rss <\/p>\n<p>An introduction to threat intelligence services in the enterprise<br \/>\nLearning about relevant threats as soon as possible gives organizations the best chance to proactively block security holes and take other actions to prevent data loss or system failures.<br \/>\nThreat intelligence services are relative newcomers to the security industry, so there are still a lot of differences in the types of services each offering delivers.<br \/>\nLink: http:\/\/searchsecurity.techtarget.com\/feature\/An-introduction-to-threat-intelligence-services-in-the-enterprise <\/p>\n<p>Airbus Wins UK Cyber Center Research Deal<br \/>\nLONDON \u2014 The creation of a UK virtual cyber operations center aimed at defeating battlefield attacks took a step forward with the award of a small study contract to Airbus UK by Ministry of Defence researchers.<br \/>\nAirbus Group&#8217;s technology innovation arm in the UK announced Monday it secured a \u00a31.4 million (US $2.1 million) deal late last year from the MoD&#8217;s Defence Science and Technology Laboratory (Dstl) to study the development of a 3-D virtual world to enable analysts, military experts and others to collaborate and share situational awareness to detect and counter cyber attacks on information and weapon systems.<br \/>\nLink: http:\/\/www.defensenews.com\/story\/defense\/policy-budget\/cyber\/2015\/03\/23\/airbus-dstl-cyber-center-award\/70326802\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data company [IDT911] to open European HQ in Galway A company that offers data protection services is to create 60 jobs with the opening of its European headquarters in Galway. The company provides identity management, fraud monitoring and cyber security services to 17.5 million private customers in the US and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1006","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1006"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1006\/revisions"}],"predecessor-version":[{"id":3493,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1006\/revisions\/3493"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}