Tag Archive for: putting

Sage suffers data breach, putting details of UK and Irish businesses at risk

Online accounting software company Sage has suffered a data breach, putting the details of a “small number” of its UK and Irish business customers at risk.

As the company briefly noted on its website:

We believe there has been some unauthorised access using an internal login to the data of a small number of our UK customers so we are working closely with the authorities to investigate the situation.

Our customers are always our first priority so we are communicating directly with those who may be affected and giving guidance on measures they can take to protect their security.

If you have any concerns at all, you can reach us on the following contact details:

The dedicated helpline number is 0845 145 3345 – please leave a message with your details and we will get back to you as soon as we can. You can also get in touch with us by emailing us at [email protected].

Richard De Vere of the AntiSocial Engineer posted this weekend providing further information and commentary, saying that the “personal details and bank account information for employees of as many as 300 large UK companies may have been compromised.”

De Vere went on to warn of the risks of insider threats to all businesses:

“An insider threat can strike any business, Sage have an industry leading product that is secure as many cloud providers are these days. The problem isn’t with Sage, but in how companies manage these insider risks.”

Sage says it has been contacting affected customers.

Graham Cluley

Mobile Security: putting the consumerisation genie back in the bottle – Gigaom


Gigaom

Mobile Security: putting the consumerisation genie back in the bottle
Gigaom
Since the arrival of the first consumer-bought smartphones, enterprise security has been under threat. That all-important chain of defense against security risks has been undermined by its weakest link, people, in this case by using non-standard

“mobile security” – read more

Cyber warfare overshadows ‘netwar’ concept putting US at risk, new ODNI paper … – FierceGovernmentIT

Cyber warfare overshadows 'netwar' concept putting US at risk, new ODNI paper
FierceGovernmentIT
While many government officials are focused on cyberwarfare following a spate of high-profile cyberattacks including the recent Office of Personnel Management data breach allegedly by Chinese hackers, a new paper states that another concept called …

cyber warfare – read more

Still putting your PGP-protected PC in hibernate? $300 app can hack it

Cracking PGP, TrueCrypt, and other strong encryption packages just got more affordable, with the release of a $ 300 package that can pluck decryption keys out of computer memory in certain cases.

Thursday’s release of the Elcomsoft Forensic Disk Decryptor poses the biggest threat to people who leave their pre-OS X 7.2 Mac laptops or FireWire-equipped PCs in hibernate or sleep states while encrypted drives are mounted. It has long been possible to use the FireWire or Mac Thunderbolt interfaces to retrieve the contents of volatile memory on machines that are password-protected but not powered down. But until now, it has cost closer to $ 1,000 for an easy and reliable way to use that data against people using strong full-disk encryption programs.

The new product from Moscow-based ElcomSoft changes that. Like Passware, which Ars first chronicled in 2009, it’s able to comb through memory dumps and locate the cryptographic keys stored inside. But at a third of the price, Forensic Disk Decryptor could bring that capability to a much larger customer base.

Read 9 remaining paragraphs | Comments


Ars Technica » Technology Lab