Tag Archive for: behaviors

Ethical hacker discusses dangers of poor cybersecurity behaviors


Smartphones and personal computers make access to bank accounts convenient for customers and hackers alike. To combat online threats, banks employ their own hackers

DAUPHIN COUNTY, Pa. — Smartphones and personal computers make access to bank accounts convenient for customers and hackers alike.

To combat online threats, banks employ their own hackers.

The Pennsylvania State Employee Credit Union has more than half a million members, making it the largest credit union in the Commonwealth.

And with so many accounts, online hacking attempts are just part of the workday.

“We’re seeing attacks come from China, from Russia, even North Korea, and we have to make sure those attacks don’t get through,” said Manager of Security Operations Scott Lenker.  

In order to protect customer information from prying eyes, Lenker uses his skills as a United States-certified ethical hacker.

“From a certified ethical hacker standpoint, we actually break into the systems, we make sure that we’re the first people to find the vulnerabilities, so if we break into and find the vulnerabilities, we’re able to fix it before the bad guys are able to get in,” said Lenker.

His proactive approach to cybersecurity is common among other ethical hackers that use their hacking skills for good, rather than for damage.

“It’s in the high 80s to low 90% of hackers out there who are financially motivated. Now there are other hackers that are trying to steal your personal information and they’re trying to use that for other nefarious reasons,” Lenker explained. 

Most hackers are able to manipulate a user’s online account through various means, regardless of a user’s protection plan.

Virtual private networks and two-factor authentication can be bypassed,…

Source…

Gurucul identifies cloud threats based on identity, behaviors

Gurucul is extending its identity-based threat detection to cloud-based applications with a new platform that monitors who has access to what and what they are doing with it.

Cloud Analytics Platform (CAP) lets customers analyze identities – the correlation of individuals and the machines they use – as they consume resources in the cloud to set a baseline for acceptable behavior and to find anomalies that may indicate threats.

+ ALSO ON NETWORKWORLD: 8 Cloud Companies to Watch Following MONSTER Funding Week +

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Creepy surveillance: Mannequins secretly record shoppers and profile behaviors

It’s doubtful you ever stop to think about all of the overhead security surveillance cameras in stores, but you are aware it’s there. A new twist on secretly spying on shoppers would put the camera at your eye level because it is hidden in the eye socket of $ 5,130 Almax mannequins. If you think dolls are a bit creepy, then how about life-sized dolls that can record a shopper’s “age range, gender, race,…
Ms. Smith’s blog