11.12.15

Data breaches ‘likely’ to affect consumer loyalty


Consumers are reluctant to continue shopping with a business that has experienced a data breach, according to a new global survey by Gemalto.
This is particularly the case where financial information is stolen, with nearly two-thirds (64%) of respondents stating this to be a decisive factor in reevaluating their relationship with a brand.
The theft of personal information was also cited as reason for knocking consumer trust in an enterprise, with close to half (49%) stating that in such an event they are unlikely to continue with the affected organization.
Many of the individuals taking part in the poll expressed concern over the way in which organizations approach cybersecurity, especially when it comes to securing their data.
Most felt that businesses do not consider it a priority. Only 25% feel that this matter was treated with seriousness.
This is also reflected in employee perception, with only two-fifths (38%) of employed respondents confident that their employers are focused on protecting consumer data.
“The media coverage of massive data breaches has done little to instil consumers’ confidence in how well companies, big and small, are protecting their data,” commented Jason Hart, vice president and chief technology officer for data protection at Gemalto.
“The fact that employees don’t even feel that their employers are taking the protection of their personal data security very seriously rings alarm bells.
“Either companies need to increase their security measures or, assuming that they already have these in place, they need to communicate this to their customers.”
Some of the apprehensions aired by consumers are framed by their personal experience of a data breach, with 31% confirming that they have been compromised in the past.
News of this comes on the back of a new survey from Manpower, which suggests that businesses are in fact beginning to respect the threat posed by cyberattacks.

This has resulted in a boost to the security industry, with major enterprises keen to pay above and beyond for cyber professionals to help them bolster their network defences.

Tech support scams: 3 steps to conning unsuspecting victims

By Editor posted 10 Dec 2015 - 01:49PM

Among many other things, the recent cyberattack on TalkTalk has brought to light another associated threat – tech support scams. Interestingly, as various media reports have revealed, very little is actually known about this sophisticated type of fraud, despite it being a longstanding problem.
The result is that time after time, unsuspecting victims are not only being duped out of their money, they are also having their devices infected and their documents destroyed. Our guide offers an insight into this increasingly topical issue, which was recently discussed in a BBC documentary.
Before the scam, there is data
There is always a backstory to a tech support scam and it begins with cybercriminals getting their hands on personal information. They use multiple and extremely sophisticated techniques to access such data.
Once in possession of this sensitive and lucrative informative, they are presented with two options depending on their own interests and capabilities: they either use it themselves or sell it on to other fraudsters. The latter usually happens on one of many marketplaces on the dark web.
Usually, the information that is exchanged is ‘incomplete’, meaning it limits a criminal’s ability to commit certain types of crime. They need further information to complete their ‘identity jigsaw’. This is where tech support scamming comes in, especially the kind that mixes new (the internet) and old (telephone) technology to devastating effect.
1.    First contact and the building of trust
Depending on the context of any particular case, a tech support scammer may immediately contact victims or hold back for a more opportune moment to pounce. It seems to matter very little about whether a data breach has been made public or not – both offer benefits to criminals.
For example, if an attack has gone unnoticed, fraudsters can use this situation – whereby it is ‘business as usual’ guise – as an asset, while similarly, public knowledge of an attack is similarly advantageous (people expect to be contacted by companies, broadband and mobile providers).
When a customer picks up the phone, a charade begins. Through social engineering and clever use of information in their possession – such as names, addresses and account details – the scammer is able to manipulate their victim into believing they are genuine.
This authoritative impersonation of a broadband/mobile provider, bank, law enforcement and/or computer company is a crucial step in gaining trust. All the other demonstrations of technical capabilities and the sense of familiarity exuded by the caller simply add to the growing confidence people have that the reason for the call ( such as there’s been a data breach and you’re affected; your computer has a virus on it; you’ve been the victim of fraud and we’re here to reimburse you and so on).
Another reason why scammers are so effective in this phase of a con is that they often appear unhurried, friendly and conversation. All of these characteristics are the kind most people assume to be absent when fraud of any kind is taking place – it’s quick, it’s impersonal and there’s brevity.
2.    Unlocking the digital door that guards your device
Once a certain level of trust has been established, the fraudster explains in a very matter of fact way that they need to run certain checks, including confirming personal information – security questions and answers, for example – and technical.
The latter pertains to a victim’s computer, a strategy which plays on most people having a limited understanding of the ins and outs of how devices work. The scammer will get them to open up a window, which will ‘evidence’ issues, the kind that could cause serious damage.
Mr. Harley has discussed an example of this in detail in a previous post on We Live Security. The focus here is on Windows users and, on being instructed to open up Event Viewer – which keeps a system log – an individual will see “system events”. Some of these are genuine problems but “they’re usually transient errors and glitches that have already come and gone”.
Nevertheless, on unsuspecting people, this can be an effective tactic. It helps to establish further trust because they appear to be showing you actual problems. Therefore, as you’d allow a plumber into your home to fix your broken pipes, the same applies here. Your digital door is unlocked and the scammer now has your control of your computer.
3.    Working hard to ‘resolve the issue’
A number of scenarios can be played from this point onwards, but a recent scam  involving an elderly couple and TalkTalk features all the hallmarks of most cons like this. Harold and Barbara Manley from Kent in the UK and both in their 80s, received a call purportedly from the telecommunications company, saying their computer had been compromised.
They were told that this could be fixed and, moreover, would receive immediate compensation worth £200. However, ‘TalkTalk’ needed access to their computer to fix the vulnerabilities. Afterwards, the caller explained that they had to log into their online account to receive payment.
“On the screen a statement appeared with a £5,200 in credit,” Barbara told This is Money. “They said they had made an error and needed to debit £4,900 and the rest could be kept as compensation. I’m not into computers so I don’t know how they did it but it looked so genuine’.”
Except it is not. Now that they have control over a computer, they are able to manipulate what the victim sees and in this case and many others, what can be seen is not real. Meanwhile, in the background, they are busy taking money out of the account.
The key thing to understand is that the impression of professionalism and apparent resolution of a problem all contributes to a positive experience that unfortunately leaves few victims in doubt. Account details are quoted in full, customer service is impeccable, faults are visibly patched and compensation is given.
And, after everything is resolved, people go about their ordinary business, unaware of what has happened. It’s not until later, maybe that evening, the next day or even longer, when the penny drops. By that time it’s already too late.
Knowledge and appreciation of the threat goes a long way
These kinds of instances needn’t happen. Along with investing in security solutions across all your devices and adhering to best practice like using strong, unique passwords for various accounts, understanding the nature of tech support scams and the seriousness of cybercrime will go a long way in keeping you safe.
The TalkTalk incident highlights that this issue is very real and, as Financial Fraud Action UK, pointed out at the start of November, there is evidence to suggest that there is a boom in scamming.

“Fraudsters are cunning and will go to great lengths to steal your cash,” explained Katy Worobec, director of FFA UK. “This scam is just another example of the tricks they will use. “You should never let someone else have access to your computer remotely, especially if they have contacted you via an unsolicited phone call.”

10.12.15

Gartner Names Software AG a Leader in Integrated IT Portfolio Analysis Applications (IIPA) Magic Quadrant for 5th Year



·         Positioned highest in execution for Alfabet solution
·         Digitalization driving awareness for IIPA
·         IIPA combined with Enterprise Architecture (EA) helps align portfolio decisions with IT strategy
·         Software AG only vendor positioned as a Leader in both IIPA and EA Magic Quadrants


Software AG today announced that Gartner, Inc., a leading industry analyst firm, has named Software AG a Leader in its ‘Magic Quadrant for Integrated IT Portfolio Analysis Applications’ report (published on November 30, 2015*) for its Alfabet solution. Alfabet offers management and governance capabilities across multiple IT portfolios to provide the CIO and other leaders with the information they need in order to make broad, directional and strategic decisions. It enhances communication and collaboration among different IT portfolio managers and helps them understand the symbiotic relationships between the infrastructure portfolio, application portfolio, project portfolio, finance and risk.

Software AG’s Alfabet IT Planning and Portfolio Management platform was evaluated among 9 different software vendors on 15 criteria. According to Gartner, “Leading products aggressively strive to integrate the planned execution of change to the IT footprint in response to the needs of the business, using portfolio management as a foundation. These products can analyze the cost and progress of the IT response to the business and IT strategy, and deliver the right perspectives, analysis, and impact views required by CIOs, IT portfolio managers, and other business leaders.”
Dr. Wolfram Jost, Chief Technology Officer and member of the Board, Software AG, said: “We believe the positioning in the Gartner Magic Quadrant is evidence of a thorough understanding of the needs of this growing market. We feel Software AG’s improved movement upwards in this market clearly demonstrates our ability to keep pace with the CIO’s needs to effectively manage the complexity involved in transforming to a digital enterprise.”

EA is an essential component of IT portfolio decision-making

As IT organizations mature in their ability to manage their application, technology, and project portfolios, they see the interdependencies among these portfolios. They realize that an integrated view is necessary in order to assess the across-the-board requirements for transformation to a digital business. Understanding these and the inter-portfolio impact of proposed change to the IT landscape helps guide investment decisions and avoids potentially damaging cost-cutting measures. EA provides IIPA with the insight into the IT landscape. The Gartner report states: “Identifying the points of intersection between elements in these portfolios and "desired state" models created from enterprise architecture (EA) helps IT align the decisions it makes in any IT portfolio with current IT strategy.” Software AG was also positioned as a Leader in Gartner’s recent “Magic Quadrant for Enterprise Architecture Tools” (published: November 4, 2015)

New Alfabet product release enables IT portfolio management in the office or on the road

Alfabet follows Software AG’s aggressive 6-month release cycle. Its recent release 9.9 (GA October 2015) provides planning and management of the IT portfolio on mobile devices, on-premises and in the cloud acknowledging an ever-more mobile workforce and the breadth of stakeholders involved in business and IT transformation. New release features facilitate the planning of cloud-based solutions and help protect against the threats posed by today’s open computing environments.
The complete Gartner report is available at www.softwareag.com/recognition.
*Gartner, “Magic Quadrant for Integrated IT Portfolio Analysis Applications”, published: 30 November 2015, by Daniel B. Stang, Jim Duggan

###

Gartner Disclaimer
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


8.12.15

Over 100,000 mobile phones and laptops left in UK bars each year



New study reveals that life size skeletons, inflatable elephants and over a hundred thousand mobile phones are just some of the things left in UK bars each year

Just in time for the Christmas party season, a new study from internet security firm ESET has revealed that UK bars guzzle up a staggering 138,000 mobile phones and laptops each year, and alarmingly 64 percent of the devices do not have any security protection installed, which means anyone can gain access to the contents they hold.

As part of the study ESET phoned over 600 bars across the UK in order to establish how many phones and laptops are found each year. The results showed that on average 12 phones or laptops will be found in each bar across the UK annually. However, the good news is 83 percent of the bars involved in the study revealed that the majority of devices they find do get reunited with their rightful owner.

Commenting on the findings from the study, Mark James, security specialist at ESET, said: “As we head into the festive season offices will be preparing for Christmas parties, which will inevitably involve alcohol consumption and people dropping their guard more than usual. This could also mean people taking work laptops and mobile phones along to parties and, based on the figures from our study, accidently forgetting them when they leave for home. While the majority of the devices in our study do get returned to their owners there is still a high chance that those with no security protection are accessed by intruders. As our laptops and mobile phones begin to carry more and more sensitive information and are linked to bank and work accounts there is a greater need to protect them because the risks are much higher should the devices ever fall into the wrong hands.”

Other findings from the study revealed that upon finding a device 61 percent of bars made contact with the owner by accessing it, while only 18 percent said they handed the device into the police. In addition to this, when survey respondents were asked if they had a snoop around the device if they found it unlocked worryingly 60 percent admitted to doing so.

“While it is fantastic news that so many of the devices in our study got reunited with their owner what people need to ask themselves is what information did the person who found the device access before it was returned. I imagine the majority of people who find a phone or laptop will actually have a look around and see if there is anything of any interest or value to be found. What people need to start asking themselves is – could any of the data held on my mobile or laptop compromise me either personally or professionally if it fell into the wrong hands? If the answer is yes, which I expect it will be, then security on your device must be a priority, not an afterthought,” continued James.

And finally, when survey respondents were asked about unusual items that had been left behind in bars over the last year some of the most alarming objects included:

§  Someone’s ashes
§  A child
§  Numerous pairs of shoes
§  A tree
§  An inflatable sheep
§  A giant picture of a horse

ENDS

Research Methodology

ESET conducted outreach via phone to more than 600 bars in the U.K. in November 2015 and extrapolated these figures based on 11,162 bars in the UK according to Yell.com.

ESET helps to disrupt “Dorkbot” - major botnet malware


ESET took part in a global operation to uncover malware affecting more than a million computers.

The operation by law enforcement agencies around the globe led by the FBI, Interpol and Europol disrupted the Dorkbot infrastructure, including Command and Control servers in Asia, Europe, and North America. What’s more, the operation has led to the seizure of domains, thus disrupting the botnet operators’ capacity to control their victims’ computers.
“To make the internet safer and protect our users, we have contributed to the disruption efforts. In the case of Dorkbot, ESET shared technical analyses and statistical information about the malware and provided the domains and internet addresses of the botnet’s command and control servers,” said Jean-Ian Boutin, Malware Researcher at ESET.
Dorkbot is a well-established botnet  based on Win32/Dorkbot malware that is distributed via various channels, such as social networks, spam,  removable media and exploit kits. Once installed on the machine, it will try to disrupt the normal operation of security software by blocking access to its update servers and will then connect to an IRC server to receive further commands.
Besides being a password stealer targeting popular services such as Facebook and Twitter, Dorkbot typically installs code from one of several other malware families soon after it gains control of a given system. Notably, Win32/Kasidet, malware used to conduct DDoS attacks also known as Neutrino bot, and Win32/Lethic, a well-known spambot, are regularly dropped by Dorkbot onto compromised systems.
“As we’ve seen thousands of detections every week coming from almost all parts of the world and there are fresh samples arriving daily, Dorkbot seemed like a viable target for a disruption effort,” commented Jean-Ian Boutin.
ESET products currently protect their users against thousands of variations of Dorkbot modules, along with many other forms of malware distributed by the Dorkbot botnets. Internet users who believe that their system might be infected by Dorkbot can make use of ESET’s free tool to run a thorough scan.
You can find more information about the Dorkbot and how it was neutralized in a dedicated article by Jean-Ian Boutin at WeLiveSecurity, ESET’s official blog on (not only) security. For more updates follow hashtag #Dorkbot on social media.


Software AG Releases Latest Apama Capital Markets Foundation


§       

      Combines historical, real-time and predictive analytics functionality
§       Provides access to latest premium Capital Markets adapters
§       Supports use on local, server, or Cloud platforms


Software AG (Frankfurt TecDAX: SOW) today announced the availability of its Apama Capital Markets Foundation (CMF) Release 9.9, which comprises a comprehensive set of libraries, components, and services for the rapid creation of scalable, feature-rich capital markets solutions.

Dr. Giles Nelson, senior vice president of Product Strategy and Marketing, Software AG, noted: “We are committed to providing our Capital Markets customers with the most advanced platform for developing innovative trading, risk and compliance applications that monitor, analyze and act on vast, fast-moving data streams. Apama provides the perfect hybrid platform enabling firms to either build their capital markets applications with their own proprietary IP from scratch or buy ‘off-the-shelf’ solution accelerators.

Based on the Apama Streaming Analytics platform, the Apama CMF is built on easily configurable building blocks and, in Apama 9.9, includes the following new capabilities:
·         Predictive Analytics – enables identification of significant events, for example predicting the likelihood of a client breaching Market Access Rule pre-trade risk controls in the near future;
·         Premium Capital Market Adapter Upgrades – the latest versions for the financial information exchange (FIX) protocol for EBS Spot Ai, automated FX rate price streams, order entry and order execution with Currenex FIX, and access to Bloomberg B-Pipe real-time data distribution;
·         Apama Queries Designer – enables business analysts to develop Apama Queries within Software AG Designer more easily. Apama Queries now includes improved tooling with additional tooltips, simpler screen layouts, better on-screen representations of data, advanced expression editing, and more informative error reporting;
  • On-premise or Cloud Deployment – support for Docker Containers helps Apama users deploy and use the Apama platform consistently in on-premise and cloud environments;
  • Additional Apama 9.9 highlights can be found here: http://bit.ly/1KUSdHi.

Nelson continued: “The ability to predict what is likely to happen is the new frontier for many capital markets applications. Whether its predicting breaches of credit limits, erroneous order flow pre-trade, or the likelihood of market abuse or money laundering, the shift from simple parameter-driven models to predictive models has begun. Predictive analytics uses patterns found in historical and real-time data to indicate what is ahead.”

This latest release of the Apama CMF embodies more than 15 years of experience in delivering such applications across multiple asset classes and in every major financial center in the world. The next generation adapters raise the bar in terms of performance and functionality.  Apama is the world's number one fast-moving, Big Data streaming analytics platform, used in many applications within capital markets but also using in commercial applications globally including real time visibility in manufacturing ERP systems, logistics optimization and customer experience management.