Archive for Press Releases

Hackers managed to steal over 61 million records from US retailers despite decline in cyber attacks: IBM

This press release has been published as it is without any editing. This Website has not verified claims, if any, made it in.

Armonk, N.Y, Jan. 5, 2015, PRNewswire: According to findings released today by IBM (NYSE: IBM), despite an 50 percent decline in the number of cyber attacks against U.S. retailers, the number of records stolen from them remains at near record highs. IBM Security researchers report that in 2014, cyber attackers still managed to steal more than 61 million records from retailers despite the decline in attacks, demonstrating cyber criminal’s increasing sophistication and efficiency.

IBMLOGO

Contrary to what most would expect, the majority of cyber attackers scaled back their hacking efforts around Black Friday and Cyber Monday in 2014 rather than capitalize from the massive spike in retail spending. The 2014 Retail Research and Intelligence Report and the Holiday Trends: Black Friday/Cyber Monday Research and Intelligence Report were created by IBM’s Managed Security Services team of analysts, who monitor more than 20 billion security incidents every day.

According to the research, cyber attackers are becoming increasingly more sophisticated, using new techniques to obtain massive amounts of confidential records with increased efficiency. Since 2012, the number of breaches reported by retailers dropped by 50 percent. Despite this decline, the perpetrators were able to impact a far greater number of victims with each incident.

“The threat from organized cyber crime rings remains the largest security challenge for retailers,” said Kris Lovejoy, General Manager, IBM Security Services. “It is imperative that security leaders and CISOs in particular, use their growing influence to ensure they have the right people, processes and technology in place to take on these growing threats.”

Black Friday and Cyber Monday

Identified as the two biggest shopping days of the year by IBM’s Digital Analytics Benchmark, cyber attackers reduced their activity across all industries on Black Friday and Cyber Monday, rather than taking action. When looking at the two week period (Nov 24 – Dec 5) around these days, the data shows the following activity across all industries:

  • The number of daily cyber attacks was 3,043, nearly one third less than the 4,200 average over this period in 2013.
  • From 2013 and 2014, the number of breaches dropped by more than 50 percent for Black Friday and Cyber Monday.
  • In 2013, there were more than 20 breaches disclosed including several large breaches that caused the number of records compromised to rise drastically, reaching close to 4 million.
  • Over the same period in 2014, 10 breaches were disclosed which resulted in just over 72,000 records getting compromised

Despite this “cyber threat slow down,” the retail and wholesale industries emerged as the top industry target for attackers in 2014, a potential result of the wave of high profile incidents impacting name brand retailers. In the two years prior, manufacturing ranked first amongst the top five attacked industries while the retail and wholesale industry ranked last. This past year, the primary mode of attack was unauthorized access via Secure Shell Brute Force attacks, which surpassed malicious code, the top choice in 2012 and 2013.

Top Breaches Overshadow Growing Trend

Attackers secured more than 61 million records in 2014, down from almost 73 million in 2013. However, when the data was narrowed down to only incidents involving less than 10 million records (which excludes the top two attacks over this timeframe, Target Corporation and The Home Depot), the data shows a different story–the number of retail records compromised in 2014 increased by more than 43 percent over 2013.

Sophisticated Methods of Attack

While there has been a rise in the number of Point of Sale (POS) malware attacks, the vast majority of incidents targeting the retail sector involved Command Injection or SQL injection. The complexity of SQL deployments and the lack of data validation performed by security administrators made retail databases a primary target. Over 2014, this Command Injection method was used in nearly 6,000 attacks against retailers. Additional methods include Shellshock as well as POS malware such as BlackPOS, Dexter, vSkimmer, Alina and Citadel.

The data for the number of records compromised and breaches disclosed was analyzed by IBM security experts and was made publically available by Privacy Rights Clearinghouse. The remaining data came from IBM’s Managed Security services team. The full reports, click here.

About IBM Security

IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.

Advertising Message

Kodak & Bullitt Group partner for new range of mobile devices

This press release has been published as it is without any editing. This Website has not verified claims, if any, made it in.

London, Dec 22, 2014, PRNewswire: Iconic imaging brand Kodak and leading mobile device manufacturer Bullitt Group, have today announced that they will launch a range of Android-powered mobile devices offering best-in-class image management software and features along with great design and UI.

Aimed at – but not exclusively for – consumers who want a high-end experience but aren’t always as comfortable using increasingly complicated mobile devices as they would like to be, the range of smartphones and tablets will come pre-loaded with bespoke image capture, management and sharing features to offer a rich user experience.

In addition, advanced remote management software will be pre-installed, allowing family members and friends to provide help and support if needed.

“Kodak is one of the world’s most recognisable brands. It is trusted by consumers as a marque of quality and innovation,” says Oliver Schulte, CEO Bullitt Mobile. “We’ve taken that heritage and used it to inspire a range of beautifully designed devices that will let users take great pictures and edit, share, store and print them in an instant.”

Unlike other phones aimed at this target audience, the KODAK Mobile Device range will not compromise on design and user experience. With as much focus on design as well as usability, the range will stand out in a market segment that is currently under-served.

Adds Schulte: “Delivering simplicity without compromise, these devices will address a segment of the mobile device market that has been poorly served to date. By giving customers easy access to printing and sharing services while still offering the latest Android OS and features found on high-end smartphones, we will appeal to a large audience of users who value ease of use and stylish design as highly as they value functionality.”

Eileen Murphy, VP Brand Licensing, Kodak is excited to be entering the mobile handset market with the Bullitt Group. “We are impressed with Bullitt Group’s commitment to delivering a portfolio of products that embrace the quality and innovation that our brand is known for around the world.”

The first handset will be launched at CES 2015 on the Kodak stand in South Hall 1, Booth 21818. There will be further product announcements across the second half of 2015 including a 4G handset, a tablet and a connected camera.

The Kodak trademark is used under license by Bullitt Group, Ltd from Kodak.

SOURCE Bullitt Group