2020 is when cybersecurity gets even weirder, so get ready

Zdnet | December 08, 2019

2020 is when cybersecurity gets even weirder, so get ready
Tech analyst Forrester predicts that deepfakes could end up costing businesses a lot of money next year: as much as $250m. That might happen in a couple of ways. There's the risk to your share price if someone creates a deepfake of your CEO  apparently resigning from the company. Alternatively, a convincing deepfake of a celebrity well known for using your products seemingly being rude about your brand could easily hurt sales if it spreads widely. But there's also the risk that deepfakes could be added to the toolkits used by phishing gangs.

Spotlight

TWAIN is a software protocol developed by member companies of TWAIN Working Group to provide what is today the most universal standard for communicating between applications and image acquisition devices, such as scanners and digital cameras. Over the years, TWAIN has dominated local or network software to device communication for image capture purposes. Today, the TWAIN standard is also playing a star role in web application communication with devices. Developers of web applications requiring use of the TWAIN standard have a variety of things to consider.

Related News

DATA SECURITY

Infotecs' ViPNet Cyber-Security Solutions at GISEC

Infotecs ViPNet | May 21, 2021

Infotecs, a number one international cybersecurity, and threat intelligence platform provider will present its ViPNet IT security solutions at GISEC from May 31 to June 2, 2021, in Dubai, United Arab Emirates. The number of cyber-attacks has increased since 2020. Cybercriminals are taking advantage of the uncertainty of a worldwide pandemic and remote work. That's why protecting the transmission of sensitive data via mobile devices also as all IP-enabled devices are important today. the danger for companies is just too great that data of any form (voice or text messages, IP video data, exchanged business-critical documents, etc.) are going to be intercepted or may be manipulated by cybercriminals. At GISEC in Dubai at the top of May, Infotecs will present ViPNet mobile security solution. It provides market-leading secure enterprise communication tools with the strongest available encryption combined with maximum convenience, functionality, and usefulness. ViPNet provides fast, easy to use, reliable yet secure communication via email, chat, video, and voice calls (VOIP). Our pure software-based solutions deliver superior security intentionally supported symmetric key and point-to-point encryption approaches. The "Always On" solution provides fast & reliable secure connectivity even over low bandwidth or mobile networks. "The pandemic accelerated the increase of the digital economy and made governments around the world rethink how various industries operate. headquarters workspace became the New Normal," explained Josef Waclaw, CEO of Infotecs GmbH. "With our innovative solutions like ViPNet Threat Detection & Response or ViPNet Mobile Security solutions, we will help many business players build a strong, cyber-resistant ecosystem." The Gulf Information Security Expo and Conference (GISEC), the Gulf region's largest cybersecurity forum, has been held annually at the Dubai World Trade Centre since 2013. GISEC provides web security professionals from around the world the chance to seek out innovative solutions, share insights with industry experts, and equip themselves with the proper tools to guard their businesses against ever-increasing cyber-attacks.

Read More

Mobileum has found a 5G Security Sample Vendor in Gartner's Hype Cycle Identity and Access Control Technologies

prnewswire | September 03, 2020

Mobileum Inc. ("Mobileum"), a leading global provider of analytics-based roaming, telco security, risk management and testing and monitoring solutions, is pleased to announce that it has been recognized in Gartner's Hype Cycle for Identity and Access Management Technologies, 2020 and in the Hype Cycle for Privacy, 2020, as a Sample Vendor for 5G security. According to Gartner, "5G will increase the number and diversity of connected objects, potential DDoS attack vectors and entry points; this also provides more telemetry for anomaly detection" and "5G infrastructure virtualization, automation and orchestration of a service-based architecture increases exposure." Gartner continues to say, "Slicing virtual networks across shared infrastructure impacts security due to lateral movement risk, and cross-slice permeability issues."

Read More

DATA SECURITY

Honeywell Cybersecurity Research Reports Significant Increase In USB Threats That Can Cause Costly Business Disruptions

Honeywell | June 22, 2021

According to a report released today by Honeywell (Nasdaq: HON), USB-based threats that can severely impact business operations increased significantly during a disruptive year when the usage of removable media and network connectivity also grew. Data from the 2021 Honeywell Industrial USB Threat Report indicates that 37% of threats were specifically designed to utilize removable media, which almost doubled from 19% in the 2020 report. The research also highlights that 79% of cyber threats originating from USB devices or removable media could lead to a critical business disruption in the operational technology (OT) environment. At the same time, there was a 30% increase in the use of USB devices in production facilities last year, highlighting the growing dependence on removable media. The report was based on aggregated cybersecurity threat data from hundreds of industrial facilities globally during a 12-month period. Along with USB attacks, research shows a growing number of cyber threats including remote access, Trojans and content-based malware have the potential to cause severe disruption to industrial infrastructure. "USB-borne malware was a serious and expanding business risk in 2020, with clear indications that removable media has become part of the playbook used by attackers, including those that employ ransomware," said Eric Knapp, engineering fellow and director of cybersecurity research for Honeywell Connected Enterprise. "Because USB-borne cyber intrusions have become so effective, organizations must adopt a formal program that addresses removable media and protects against intrusions to avoid potentially costly downtime." Many industrial and OT systems are air-gapped or cut off from the internet to protect them from attacks. Intruders are using removable media and USB devices as an initial attack vector to penetrate networks and open them up to major attacks. Knapp says hackers are loading more advanced malware on plug-in devices to directly harm their intended targets through sophisticated coding that can create backdoors to establish remote access. Hackers with remote access can then command and control the targeted systems.

Read More

Spotlight

TWAIN is a software protocol developed by member companies of TWAIN Working Group to provide what is today the most universal standard for communicating between applications and image acquisition devices, such as scanners and digital cameras. Over the years, TWAIN has dominated local or network software to device communication for image capture purposes. Today, the TWAIN standard is also playing a star role in web application communication with devices. Developers of web applications requiring use of the TWAIN standard have a variety of things to consider.