quoted

Interview in sputniknews.com: Experte zu Handy-Hacks: So kann man sich schützen

Experte zu Handy-Hacks: So kann man sich schützen TECHNIK 14:04 04.02.2020Zum Kurzlink Von Bolle Selke Die USA hacken das Handy von Bundeskanzlerin Angela Merkel und Saudi-Arabien das von Amazon-Chef Jeff Bezos? Müssen sich also nur Prominente Sorgen um ihr Smartphone machen? Nein, sagt der IT-Experte Sorin Mustaca im Interview und erklärt, wie man sich schützen kann. Read here the original: https://de.sputniknews.com/technik/20200204326418590-handy-hacks-schutz/ Die USA hacken das Handy von Bundeskanzlerin Angela Merkel und Saudi-Arabien das von Amazon-Chef Jeff Bezos? Müssen sich also nur Prominente Sorgen um ihr Smartphone machen? Nein, sagt der IT-Experte Sorin Mustaca im Interview und erklärt, wie man sich schützen kann. – Herr Mustaca, dass sich Leute wie Jeff Bezos oder Angela Merkel Sorgen um die Sicherheit ihrer Handykommunikation machen müssen ist logisch, aber muss man sich auch als Privatperson darüber Gedanken machen? – „Ich denke schon. Das Geld oder die Vorteile, die man von einer Privatperson bekommt, sind genauso gut, wie die von anderen Quellen. Man darf nicht vergessen, dass jeder von uns ein duales Leben hat: als Privatperson und als Geschäftsperson – egal ob als Angestellter oder Selbstständiger. Ein Lebensteil beeinflusst den anderen, das ist immer so. Die Informationen, die jemand über unser Privatleben hat, beeinflussen daher auch das Geschäftsleben.“ – Immer wieder gibt…

Read More

Interview with the SafetyDetective.com

” Aviva Zacks of Safety Detective sat down with cybersecurity expert Sorin Mustaca. She learned that his company is helping to both educate customers and provide them with solutions to combat cyberthreats. ” Read the entire text here: https://www.safetydetectives.com/blog/interview-sorin-mustaca/   Safety Detective has made it to the “In the news” page.


Exclusive interview for IPSwitch: When Security Awareness Training Overwhelms Users, Can Technology Help?

A new article of Michael O’Dwyer got published in IPSwitch: When Security Awareness Training Overwhelms Users, Can Technology Help? I am happy to say that I was the only one interviewed, so this is actually an exclusive interview with me.   “I would say that humans are the biggest problem, because they are the weakest link. It is true and quite normal that humans make mistakes,” said Sorin Mustaca, CSSLP, Security+, Project+, an independent IT security consultant.   “Unfortunately, there are more and more security companies out there which have a bigger marketing department than R&D. They have no problem in saying that they can offer protection against anything. Users should be careful when they read something like this and not blindly trust such marketing messages,” advised Mustaca.   Read the full article here: When Security Awareness Training Overwhelms Users, Can Technology Help?


The pros and cons of new tech: Science fiction collides with reality

“The pros and cons of new tech: Science fiction collides with reality” by Michael O’Dwyer As Sorin Mustaca, an independent IT security consultant, says, “Adopting new technologies is never a mistake, if done properly.” Assess the pros and cons of new tech There’s rarely a one-size-fits-all solution in technology, and repercussions are never as severe or life-threatening as in pop culture. However, there are repercussions for ill-chosen solutions in terms of business continuity or process interruption. Mustaca advises businesses to consider all the following before adopting new tech: Know what you want. Find and clearly define the planned use of the technology. Evaluate your processes and decide how you can adapt the working processes to effectively utilize the new technology and gain the full effects and benefits it provides. Consider end users and supply them with guidance and training, as necessary. Make sure the technology is secure. You want it to properly interact with the data you provide and forbid unauthorized data access. Be mindful of infrastructure management, as the use of new software may also drive hardware upgrades.   To adopt or not to adopt—that is the question By identifying what was not optimized, the company upgraded their system…


Healthcare mobile device security 101—solving modernization risk factors

Source: “Healthcare mobile device security 101—solving modernization risk factors” by Michael O’Dwyer | December 22, 2016 Many of these devices aren’t designed for business use, which is another cause for concern. According to Sorin Mustaca, CSSLP, Security+, Project+, owner of Sorin Mustaca IT Security Consulting, “Most of these devices are taken from the consumer world and quickly adapted to use in healthcare. For this reason, these devices are not always properly secured, making the threat landscape pretty much unknown.” Mustaca agreed, adding that recognizing the dangers is paramount and includes dealing with risks, such as lost or stolen devices, and installing antivirus solutions on all devices (including the gateway). Other considerations or recommended best practices for mobile devices and their users include: Keeping your mobile operating systems up to date. Only downloading apps from the official app store. Third-party app stores are more likely to have malware. Not connecting to free Wi-Fi networks, and if you must, avoiding sensitive business tasks. Learn from healthcare mobile device security infrastructure In terms of infrastructure considerations, mobile device management (MDM) is essential. Mustaca insists on the use of encryption on all network connections and storage, even if open networks make admin tasks easier….


Annoying Internet Ads: An Open Letter To Digital Marketers Everywhere

I gave a nice interview to MICHAEL O’DWYER for IPSwitch and he wrote the following article: Annoying Internet Ads: An Open Letter To Digital Marketers Everywhere “Ads consume bandwidth, especially those delivered as Flash or code. If you’re on a mobile device, with a small screen, the ads will also cover a good portion of the screen, thus making it difficult or even impossible to see the desired content you want to see,” says Sorin Mustaca, CSSLP, Security+, Project+, an independent IT security consultant. “[Over] the last 3 years, we hear[d] more and more about malvertising — the delivery of malicious software instead of ads, or in parallel with ads,” adds Mustaca. Read the entire article using the link above.   What can be done? Certainly, the solution is not to remove ads completely. They finance a large part of the free Internet. Make them not so intrusive anymore. Make them smart and useful – make them related to the content you’re reading. How? On this site and especially on www.ITSecurityNews.info I use Adsense through Google’s own WordPress plugin for Adsense. It inserts up to 3 dynamic ads on a page and if there is the danger of having too many ads…


Dropbox was breached in 2012, the data is now online – a quote in SecurityWeek

68 Million Exposed in Old Dropbox Hack By Ionut Arghire on August 31, 2016 In an email response to a SecurityWeek inquiry, IT security expert Sorin Mustaca said that the surprising fact is that the 2012 hack of Dropbox didn’t emerge earlier, along with the other mega-breaches. He also notes that the use of the SHA1 hashing algorithm with salting improves the security of these passwords. “Fortunately, Dropbox was using the SHA 1 hashing algorithm (today this is not considered “strong” anymore) and it was using salting even in 2012 – an operation that many other services don’t do even today. Many are using legacy systems which make use of MD5 without hashing – I guess that the ‘never change a running system’ is still applied literally in many websites,” Mustaca said. To stay protected, he says, users should create unique passwords for each of the services they use, never reuse passwords, and enable two-factor authentication wherever it is available. Service providers should never store passwords in plain text or encrypted, but should use a strong hashing function with a solid salt.   For consumers: –        Create a unique password for each service you use. Read my free eBook in…


VPNMentor.com: Cybertalk with IT security expert Sorin Mustaca

Cybertalk with IT security expert Sorin Mustaca   vpnMentor has had the privilege of talking with Sorin Mustaca, a Certified IT consultant with over 15 years of experience in IT security, and author of “Improve Your Security”, a guide for the common end user that deals with the question of how to beware of cyber threats on the individual level.   By Ditsa Keren, 16/06/2016 Content Can you tell us a little bit about your background in IT security? With so many new threats and with the fast development of hacking technologies, how can an anti-virus stay up to date and protect a company from being hacked? What can you tell us about the recently emerging Ransomware encryption Malware attacks? What defenses would you recommend in the case of a ransomware attack? What can you tell us about the recent leak of over 32 million twitter accounts? Why do we only see these leaks now? Do you recognize a specific country from which the majority of hackers operate? Do you see any leakage of cyber technology between military intelligence organizations and the dark net? Can you give us some examples? What kind of new cyber threats can we expect to see…


Quoted in SecurityWeek.com: 45 Million Potentially Impacted by VerticalScope Hack

Source: http://www.securityweek.com/45-million-potentially-impacted-verticalscope-hack Author: Ionut Arghire, Security Week     Here is my longer comment:   LeakedSource writes on their website about a massive breach of VerticalScope.com and all its affiliated websites from February 2016. However, neither VerticalScope.com nor any of the websites mentioned in the LeakedSource page mention anything related to a hack. Even if denial of a breach is not something unseen before, after reading the Summary of the dump on LeakedSource I am starting to see here a pattern:  “Each record may contain an email address, a username, an IP address, one password and in some cases a second password”. This is exactly the same as in the Myspace breach:”Each record may contain an email address, a username, one password and in some cases a second password.” How come that two completely unrelated breaches share the dump format? Could it be that they are converted somehow into a single format before they are put on sale? The assumption regarding the VerticalScope hack is that they used some vulnerable vBulletin software. I have verified this myself and this is why I found on a couple of their websites: Doing a search on “vulnerabilities for vBulletin 3.8.7 Patch Level 3” can…


Article in German on Focus.de: Smartphone-SicherheitSchutz vor Hacker und Viren: So machen Sie Ihr Handy sicher

Smartphone-SicherheitSchutz vor Hacker und Viren: So machen Sie Ihr Handy sicher Mittwoch, 15.06.2016, 12:24 · von FOCUS-Online-Experte Sorin Mustaca   Zur Person Sorin Mustaca arbeitet seit dem Jahr 2000 in der IT-Sicherheitsbranche. So war er von 2003 bis 2014 bei Avira beschäftigt und dort als Product Manager für Avira Antivir zuständig. Inzwischen arbeitet er als Berater. Mustaca betreibt den Blog http://www.sorinmustaca.com/ Smartphones sind mittlerweile kleine Computer und damit anfällig für Viren und Hackerangriffe. Viele Nutzer machen sich darüber aber keine Gedanken – dabei lässt sich schon mit wenigen Maßnahmen die Sicherheit erhöhen. Handys sind inzwischen mehr kleine Computer als Mini-Telefone. Trotzdem machen sich die meisten Menschen – anders als bei ihrem Laptop oder PC -bei ihrem Smartphone keine Gedanken über Viren. Die Nutzer berücksichtigen die Sicherheit und Privatsphäre nicht so stark, wie sie es bei ihren persönlichen Computern tun. Dabei sind Smartphones genauso bedroht! Meistens genügen schon eine wenige Maßnahme, um das Handy vor Viren und Hackern zu schützen. Die Hinweise sind nach der Schwierigkeit ihrer Umsetzung für den Smartphone-Besitzer sortiert. Mehr hier: http://www.focus.de/digital/experten/smartphone-sicherheit-schutz-vor-hacker-und-viren-so-machen-sie-ihr-handy-sicher_id_5636034.html  


%d bloggers like this:

By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close