FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Wednesday, June 30, 2021

What tools can be used in the fight against identity document fraud

Back in February 2021, we wrote a blog discussing how to prevent sophisticated physical document fraud, focusing on what the fraud looks like today and what can be done to reduce it. With the Secure Identity Alliance releasing a new report offering in-depth guidance on fighting passport fraud, now is a good time to revisit this subject. There can be no doubt that document fraud is a serious crime and one that often leads to other significant threats for citizens, including human trafficking, drug smuggling, and terrorism. While it may seem like...

How have people proven their identity since the dawn of time?

The concept of human identity is something which has existed for thousands of years. Before we proved our identities with plastic cards or on our mobile devices, people proved their identity in several ways, such as language, physical identifiers or objects. As part of our series on Digital Identity, this blog will look back on the personal identification techniques of previous eras to show how methods of identification have developed over the course of human history. 100,000 years ago – Jewellery While drawing solid conclusions from evidence dating...

DoD Adds Two More (ISC)² Certifications to Requirements for Cybersecurity Staff

Earlier this week, (ISC)² announced that the DoD approved both the HCISPP and CCSP certifications to its DoD 8570 Approved Baseline Certifications table on the DoD Cyber Exchange website. Why does this matter? This means that the entire roster of (ISC)² certifications are now required for different security workforce categories within the Department, depending on...

AI everywhere: How AI is being applied in 4 different fields

Image Source: Pexels This blog was written by an independent guest blogger. Historically, the idea of artificial intelligence (AI) saturating our world has been met with suspicion. Indeed, it’s one of the more popular tropes of science fiction — learning machines gain sentience that helps them take over the planet. While we’re not even slightly close to that dystopian reality,...

How we can use strong authentication to instantly activate digital banking cards

In today’s digital world, using our mobile phones to consume services is now a part of everyday life. With the average person now spending 2 hours and 51 minutes on their phone each day, service providers like ecommerce sites and entertainment channels have had to adapt their interfaces so that they also work on a smartphone. The financial services industry is no exception. Based on our research, 80% of banked people now using their bank’s mobile app to review their transactions, check statements, and send money to others. This is due to a simple...

How can Digital First banking benefit financial institutions?

The benefits of Digital First banking for the consumer are clear. Whether it’s both physical and digital card issuance, real-time card management or secure, hassle-free online payments, the services on offer to consumers when it comes to Digital First banking are almost endless. With these digital features comes increased convenience and instantaneity, the core principles of modern banking. But what is the benefit of Digital First for banks? While better serving the consumer is always the core goal for financial institutions, Digital First can...

Data of 700 million LinkedIn users leaked and put for sale on Dark Web

LinkedIn is back in news for failing to protect its user data from hackers and this time the issue is serious as data of over 700 million of its 756 million has leaked and put for sale on the dark web. However, the professional website denies all such media claims and stated that the newly discovered data was an old one scrapped from one of the previous hacks that took place in April 2021. A spokesperson from the professional social networking website endorsed the news and said that no new data belonging to any member was exposed in the attack,...

Tuesday, June 29, 2021

New disputes to arise from ransomware payments ban

As the law enforcement agencies are urging ransomware victims not to make any ransom payment to hackers, as it not only encourages crime but also doesn’t guarantee a decryption key for sure in exchange for the payment. Some security analysts say that this could give rise to fresh troubles to businesses and their owners on a respective note. Know how….? 1.) Well, as businesses close their operations on a permanent note, their customers can drag such businesses to courts for dishonoring their prior commitments. 2.) If the victim is a law firm or...

UN Security Council holds meeting on Cybersecurity

As cyber threats on government infrastructure of various countries are growing, the UN Security Council has held a meeting on Tuesday to discuss the ongoing threats and mitigation remedies required to be followed by nations. Early this month, the same issue was brought to the notice of Russian President Vladimir Putin by Biden Administration that met each other at a summit held in Geneva. As Russia is acting as a home-ground to many hackers, Putin was asked to exchange intelligence related to them with the US law enforcement. Mr. Putin agreed it...

GrammaTech Introduces Software Supply Chain Security Platform

BETHESDA, Md.–(BUSINESS WIRE)–GrammaTech, a leading provider of application security testing products and software research services, today announced the latest version of CodeSentry which reduces software supply chain security risks like those exploited in recent attacks on downstream users of SolarWinds, CodeCov and other applications. CodeSentry quickly analyzes purchased...

Log Management and SIEM: Using Both for Enterprise CyberSecurity

Properly analyzing the massive amounts of data created by network access and the associated security tools has become a very tedious chore. Today’s cybersecurity professionals are seeking ways to better deal with the massive influx of information so that they can make intelligent choices when it comes to the cybersecurity posture of their networks. Selecting the proper tools is an important task which merits investigation. A good cybersecurity tool also helps identify potential threats and vulnerabilities while also reporting on trends that impact...

Empowering women in the field of ethics and compliance

This blog was written by an independent guest blogger. Ethics and compliance is becoming a burgeoning industry as an increase in government regulations in areas such as sustainability, diversity, and data privacy make compliance an important focus for companies. It’s especially important in tech companies as the ever-growing risk of cybersecurity breaches requires that security...

How voice biometrics can help MNOs reduce fraud

In this blog, I am joined by my colleague Pauline Pinzuti, Marketing Manager to discuss how the use of voice biometrics can help telecom operators fight ID fraud. What do mobile operations needs to know about telecom fraud? Didier Benkoël-Adechy: Mobile Network Operators (MNOs) face unprecedented levels of competition and commercial pressure. As a result, many have created extensive service portfolios, extending far beyond just mobile communications. Perhaps inevitably, the wealth of valuable services now offered by operators has attracted the...

How a man used a fake finger to trick his smartphone biometrics

Chances are you’ve seen a Hollywood film where criminals manage to access biometric security systems using basic spoof attacks such as gelatin-made fingerprints and fake irises. For example, in Minority Report, Tom Cruise’s character Anderson gets an eye transplant so that he can’t be identified by the citywide optical recognition system. But what’s even more amusing is that he carries his original eyeballs in a plastic bag to maintain access to his former workplace. The reality is that the trick that Anderson used in Minority Report wouldn’t fool...

Vulnerability makes hackers hijack video streams from millions of connected cameras

A recent study made by Nozomi Networks, a security company that offers solutions for IoT products has discovered that millions of connected cameras are on the verge of being hijacked by cyber crooks through a vulnerability. Security researchers say that the flaw is related to software component used in cloud surveillance platform ThroughTek that is used by OEMs while manufacturing IP Cameras, baby monitoring cams and pet monitoring solutions along with robotic and battery devices. Technically, the flaw is related to a P2P SDK firmware that allows...

Monday, June 28, 2021

Beware of this Windows 11 fake Download

Microsoft has made an official announcement last week that it will present its Windows 11 operating system to the world on by November this year and also made it public that all laptops that have compatible hardware and software components will be eligible for a free upgrade to Windows 11 from Windows 10. That means, all those systems running on Windows 10 OS and having a basic 4GB RAM, 64GB Storage and a 64-bit processor will be eligible for an upgrade for free of cost. Now to those who are not familiar with your PCs hardware components, here’s...

UK Ministers under probe for using personal emails for government projects

Acting on a complaint received from a Ministerial staff, the UK Information Commissioner’s office has started an investigation that deals with the fact on whether some or all the UK ministers are using personal email accounts while conducting government businesses. Elizabeth Denham, the data protection commissioner of Britain, has confirmed the news and assured that more details will be brought to light after the conclusion of the official probe. Coming to the investigation, digital evidence was found by the data watchdog that some of the UK Ministers...

Six existential threats posed by the future of 5G (Part One)

The COVID-19 pandemic has accelerated our transition towards an increasingly digital world. Now, thanks to lockdowns and remote working, people are realising, for example that meetings, which once had to be held in person, can be done via video calls equally well. With these discoveries having a positive impact on costs, operations, productivity and even the environment, there will be no going back to whatever we considered ‘normal’ prior to this global event. It is for this reason that our reliance on connectivity is also growing exponentially....

Asset management in the age of digital transformation

Over the past year or so, organizations have rapidly accelerated their digital transformation by employing technologies like cloud and containers to support the shift to IoT and address the expanding remote workforce. Visibility Matters: This digital shift calls for a new approach to asset visibility as traditional asset administration responsibilities like inventory, software...

How to achieve financial inclusion with Open Banking

If you have seen the latest banking news, you may have seen that the Competition and Markets Authority in the UK recently launched a consultation on the future of open banking to set out the principal features for open banking in its next phase of implementation. While it is important to keep the powerful forward momentum of open banking, it is not inevitable that it will continue on the same trajectory – a feat that could have major implications for tackling financial inclusion. In the past, attempting to reduce the gap between the banked and...