Page 12 - GS170802
P. 12
NewsBriefs
Major news outlets around the country poured gas on the App Store, the 30 percent commission it levies on in-app
fire, sounding the alarm about falling chips and claiming purchases and the perception that Apple imposes a higher
fraudsters can use a separated chip to create a perfectly standard on Chinese developers with regard to copyright
functioning counterfeit card. In a tweet, SecurityMetrics infringement.
(@SecurityMetrics on Twitter) shared a link to an ABC
news story that detailed the vulnerability, along with the New bill aims to protect government IoT devices
statement, "Any card can be compromised if the chip falls The proposed Internet of Things (IoT) Cybersecurity
off!" Improvement Act of 2017, introduced Aug. 1, 2017,
would create minimum security requirements for
Reporter Jason Knowles, of Chicago ABC news affiliate U.S. government, Internet-connected devices. Senate
WLS-TV, said he was not aware of exactly when his smart Cybersecurity Caucus co-chairs Mark R. Warner, D-Va.,
card chip and credit card separated. "I didn't realize for and Cory Gardner, R-Colo., and Senators Ron Wyden,
days because I was still allowed to swipe my card at many D-Ore., and Steve Daines, R-Mont., are sponsoring the
places with the magnetic strip," he said. "When I called bipartisan legislation, which would require government-
Chase, they told me I had to get a new card with a new supplied IoT devices to be patchable, updateable and
number because if someone found my chip intact, it could protected from known vulnerabilities. Security analysts
be placed on another card." are stressing the need for similar initiatives in the private
Antitrust complaint filed against Apple in China sector.
Just months after calling upon Chinese app developers to In an interview with The Green Sheet, Vanita Pandey, Vice
join in a proposed class-action lawsuit, Beijing-based Dare President of Product Marketing at ThreatMetrix, said the
& Sure Law Firm, representing 28 app developers, filed a IoT has opened new frontiers of growth and cyberthreats,
complaint with China's National Development and Reform creating "a third industrial revolution." Pandey warned it
Commission and the State Administration for Industry will only be a matter of time before a large-scale breach
and Commerce. The Aug. 8, 2017, grievance report accuses impacts mobile and IoT devices. As cybercriminals exploit
Apple of monopolistic behavior related to how it manages connected devices and human failings with familiar attack
its mobile App Store in China. patterns such as phishing and ransomware, advanced
forms of detection will be critical to protect political and
Among the issues cited, delisting from the App Store personal assets, she added.
without adequate justification appeared to be a major point
of contention. Under increased scrutiny by the Cyberspace "Humans continue to be the greatest vulnerability for
Administration of China, Apple delisted about 60 popular corporations," Pandey stated. "Today, a large number
virtual private network services on July 29, and in June, of attacks come from cybercriminals looking to exploit
removed tens of thousands of apps from its Chinese App known vulnerabilities that have never been patched
Store as part of a planned global purge, announced by despite patches being available for months, or even years,
Apple in 2016, of outdated or low-quality offerings. as evidenced by the WannaCry attacks, a concern the
proposed legislation addresses."
Also cited in the complaint were alleged restriction of
access by Apple to third-party payment providers in its Uphill battle for cybersecurity pros
An online survey of more than 400 IT cybersecurity
professionals revealed threat detection as the top
SPOTLIGHT cybersecurity challenge among 62 percent of those
INNOVATORS surveyed. ControlScan, in partnership with Crowd
Research Partners and the Information Security
Community on LinkedIn, conducted the in-depth survey
and published findings in the 2017 Threat Monitoring,
Your Detection and Response Report.
Company "This new research report is timely, because it shows that
Logo organizations are missing important opportunities to
detect cybersecurity threats before they become business
You now can have your own disruptors," said Mark Carl, Chief Executive Officer at
personalized company web space
on
e Green Sheet ControlScan. "A big part of the problem is that in-house IT
www.greensheet.com/yourcompanyname teams lack the necessary manpower and, in many cases,
the specialized knowledge to effectively defend against
Personalized News from the Wire today's attacks."
Articles from or about your company Assistant Vice President of Advertising Sales
Your executive online ads & videos 707-284-1686
Call me for the details today! danielle@greensheet.com
12