Security Current


Faxploit: New research reveals how criminals can target fax machines and spread malware

Posted on: 20 Aug 2018

Check Point researchers have announced newly discovered vulnerabilities that affect tens of millions of fax devices in businesses and homes worldwide. These breaches, dubbed Faxploit, leave the door open for criminals to hack networks by sending malicious faxes. The researchers demonstrated the vulnerabilities in the popular HP Officejet Pro All-in-One fax printers, but the same…

Berin Lautenbach, CISO for Asia-Pacific, Telstra

Posted on: 19 Aug 2018

Lucking out “I wish I could tell you I planned it all, and that this was all thought through,” says Berin Lautenbach of his path from the start of his career to his present role as Asia Pacific CISO of Australian telco giant Telstra. But he did not plan to be where he now is.…

No longer an afterthought: Security analytics takes its place in business strategy

Posted on: 10 Aug 2018

There are two philosophical schools as to how companies can protect their system. They can either do it prescriptively, telling people what they can or cannot do. The problem with this, says Igor Baikalov, PhD, chief scientist for Securonix, is that it limits the business. “Security that impacts the business this way really does not…

Israeli cybersecurity firm exposes hacking

Posted on: 09 Aug 2018

Check Point says WhatsApp weakness enables attackers to send false information Check Point Software Technologies said Wednesday it had uncovered a security flaw in WhatsApp that gives hackers the possibility “to intercept and manipulate messages sent by those in a group or private conversation” as well as “create and spread misinformation,” The Times of Israel…

Malicious Email Detector: Israeli Researchers Develop New Method to Stop Threatening Email

Posted on: 08 Aug 2018

Too often harmless-looking email in fact contains dangerous attachments or links. Researchers at Israel’s Ben-Gurion University have found a new method that uses machine learning algorithms to detect malicious emails that most commercially available security products cannot. Called Email-Sec-360°, the technique was developed by Aviad Cohen, a Ph.D. student and researcher at the David and…

David Gee, Head of Cybersecurity – Asia Pacific, HSBC

Posted on: 01 Aug 2018

When he gets some quiet time away from his job as head of cybersecurity for Asia Pacific at banking giant HSBC, David Gee does yoga. “Yoga is a metaphor for life,” he says, “…and for cybersecurity. We all have to develop core strength which includes flexibility and mindfulness.” Raised by a family that frequently threw…

The SingHealth breach: A rude awakening

Posted on: 24 Jul 2018

Singapore’s much vaunted cybersecurity defenses were overcome in a data breach that compromised the personal data of over a quarter of the Southeast Asian nation’s population.  Personal data of 1.5 million patients were stolen in the largest data breach ever in Singapore’s history. Singapore recently scored 0.925 in the cybersecurity ranking by the International Telecommunication Union, a United Nations agency. …

Kevin Mitnick, CEO, Mitnick Security

Posted on: 23 Jul 2018

Preceded by reputation Kevin Mitnick is perhaps best known as the hacker who made it to the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations. Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five…

Rebecca Wynn, Head of Information Security (Senior Director), Matrix Medical Network

Posted on: 20 Jul 2018

Rebecca Wynn has always had an affinity for education. She breezed through high school in two years and started college early, heading to Cal Poly San Luis Obispo. She initially entered a science program, but switched into the Art and Design Photography program to put her love of photography to work. After graduation, she did…

The Path of Least Resistance: Security in the Media and Entertainment Industry

Posted on: 18 Jul 2018

When Jonathan Halstuch, CTO of RackTop Systems, started providing security solutions to media and entertainment industry 18 years ago, material like videos and photos needed to be physically transported from one place to another for storage, sharing and processing. “You had to know how to safely move the data from where you are shooting or…