Nude photo leak highlights importance of two-step verification

A cloud with a padlock, Celebgate has highlighted the importance of two-step verfication for cloud users.The importance of two-step verfication (TSV) has been highlighted recently with the leaking of nude pictures of hundreds of female celebrities including Jennifer Lawrence, Kirsten Dunst, Kate Upton and many more. The images began circulating on 4Chan, allegedly after a hacker broke into the famous womens’ iCloud accounts.

This led to much scrutiny of Apple’s cloud security, but it appears more likely that rather than hack into the iCloud, the culprit either guessed the passwords or answers to the security questions. With so much information about celebrities and their lives readily available online, it’s not surprising that the answers to questions like “mother’s maiden name” or “favourite pet’s name” might easily be guessed by someone with an internet connection and a bit of spare time.

Continue reading

Cyber Security Shares: Industry Boost From High Profile Hacking

A graph showing how cyber security shares are going up and up.The security industry covers a wide range of sectors, from physical security to electronic security and even to maritime security. And as the world becomes ever more technologically advanced and more security systems use the internet, cyber security is linking all these different strands.

That’s why cyber security shares have been performing so well in recent years. In fact, whenever you hear on the news of a high profile security breach you can almost guarantee a rise in cyber security shares.

Recent cyber security shares hikes

You may not have picked up on it yet, but just a few days ago there was a major cyber security breach of the huge American home improvement retailer Home Depot. This is a firm that has branches in every state in the US and in 2013 had revenues of almost $75 billion.

Continue reading

Hacking Your Way Into A Cyber Security Career

A hacker at work. Hacking is rapidly becoming a viable career path.Hacking was seen, until quite recently, as nothing more than a nuisance. Hackers were the graffiti artists and vandals of the internet, a headache but not a serious threat.

Gradually however, hackers have become more sophisticated and their targets increasingly serious. Hacking has come of age and the world has been forced to take the perpetrators seriously.

Partly to blame for this is our own, insatiable appetite for ‘all information, all of the time’. We want to be able to access everything, from anywhere, on any device. We’ve talked on this blog before about the dangers posed by BYOD and open Wi-Fi networks.

In their attempts to meet both customers’ and staff needs, governments, businesses, hospitals and schools have taken many of their services online. In doing so, they’ve also made themselves more open to hacking.

Continue reading

Car Security Systems – More Than Just The Alarm

car_security_systemsA couple of weeks ago we talked about car hacking. This week, we’re focusing on car security systems.

Your car is likely to be one of the most expensive items you own, so keeping it safe and secure is vital. Most of us are savvy enough not to leave valuables in the car and keep the vehicle parked in a safe place. But that’s not always enough, so read on for the low-down on the latest car security system technology.

Car crime – the big picture

Luckily, advances in car security systems, positive police campaigns and driver awareness have pushed the total number cars getting stolen in this country down significantly. At one point in the early 1990s, around 700,000 cars a year were being stolen in the UK.

Continue reading

Drones Set To Boost UK Security Industry

BAE Systems Taranis, the king of dronesDrones or UAVs (Unmanned Air Vehicles) are a huge growth industry and are already employed for military use by an increasing number of air forces around the world. British company BAE Systems, whose job vacancies appear regularly on JobSecurity, are at forefront of this new technology.

BAE were responsible for ‘Taranis‘; the most advanced unmanned aircraft ever to be built in the UK. Part funded by the Ministry of Defence, it’s development was a close guarded secret . Test flights were carried out in a secluded location, thought to be the Australian desert. The size of a small fighter jet, it is designed to fly, undetected by radar, at speeds “twice as fast” as anything before, claimed Bob Fraser, a BAE Systems test pilot, in a BBC interview.

Continue reading

Car Hacking 5 – Point Plan To Boost Automobile Safety

Car Hacking has been proven to be possible.Car hacking is one of a growing number of new security threats. It’s a symptom of the reliance many of our everyday tasks now have on digital technology and the internet.

We’ve all heard of computer hacking and people are becoming more aware of the problems associated with it. You often hear in the news about millions of people’s personal data being stolen and sometimes used to con them out of money.

Car hacking is less well known but it could become a very serious problem. You can guarantee you’ll be hearing more about it in the future. It’s a new branch of the ‘internet of things’ debate, where every day physical items are being connected to the internet and exposing more aspects of our lives to hacking.

Continue reading

The Free Wi-Fi Network Security Nightmare

Free Wif-Fi in coffee shops can be network security nightmareWi-Fi and network security have increasingly come under the spotlight of late. More and more public venues, such as coffee shops, cafes and bars, have begun to offer free Wi-Fi as standard. As well as the army of freelancers who make such places their office, leading to the coining of the term “the coffice”.

Business meetings are also taking place in coffee shops and bars. Office workers on the move are also hopping on at these free access points with smartphones, tablets and laptops to check. And their checking work emails, downloading attachments and catching up on the day’s work.

The upshot of all this, is that a lot of data is being downloaded and uploaded on networks which may not have the level of Wi-Fi and network security the IT staff back at the office might hope. In actual fact, the risks of sending and receiving sensitive data over open networks are huge. This puts both companies and their clients at risk.

Without proper Wi-Fi or network security you never know who is siphoning off your data. And the culprit could be at the next table, upstairs in the flat above, or even from the park across the street.

Continue reading

Thermographic Security Cameras To Enter Mainstream

Thermographic security camerasThermographic security cameras are coming down in price and are set to become more mainstream security devices. Sometimes also known as infra-red cameras, they were first developed way back in the 1950s and their original use was actually for the US military in the Korean War. It seems that it’s often the case that security technology is adapted from military uses.

Thermographic security cameras are incredibly accurate and useful in spotting intruders. So why haven’t they been used in home security up till now? Along with intruder alarms, CCTV cameras have instead become one of the most widespread pieces of home security equipment.

Continue reading

Acknowledging The Maritime Cyber Security Threat

Maritime Cyber Security is a growing concern.Cyber security is one of the hot topics on this blog. There’s hardly a day goes by without a new development in this extremely fast moving sector.

As cyber criminals develop new ways of attacking our systems and stealing our data the industry must respond. However, as we know, the industry is experiencing a cyber skills shortage. We’re struggling to meet the massive demand for cyber security services.

As digital technology enters almost every aspect of our lives, the need for better cyber security in all industries is becoming crucial. We’ve written before about maritime security and the opportunities available for manned security aboard shipping. Now, maritime cyber security is becoming a new niche job market.

Continue reading

Think Small For Big Fire Protection Opportunities

A row of fire extinguishers illustrating the fact that fire protection offers big opportunities.We’ve just been through a long, hard recession but it now seems like business is picking up. While many people are still struggling with the cost of living, for the security industry, there are definite grounds for optimism.

As other businesses start to grow, their security needs increase, and one thing they shouldn’t be scrimping on is fire protection. There is also a robust regulatory framework to ensure businesses protect staff, customers and property.

There are big fire protection opportunities out there. Now is the time for savvy fire equipment installation companies to gain business, as there are definitely a growing number of companies out there that will need to expand their fire safety provision.

Continue reading