Cyber Attacks Take a New Angle

by , on

We recently reported on a data leak by hackers on Goldman Sachs CEO and Chairman, Lloyd Blankfein earlier this week. Since then, news reports have been developing regarding the connection of online activism and protests against Wall Street and the financial system.

“Members of the Anonymous collective are not just taking their activism to the Internet and the streets; they’re now targeting corporate financials with a securities research arm,” according to CNET, who displayed a type of logo for Anonymous, describing the organization as “Acquiring information through unconventional means”.

The unconventional means that are being described here have to do with the power that hackers have to infiltrate any computer or device that is connected to a network. In support of the hacker group Anonymous’s “anti-corporate, anti-censorship, pro-civil liberties messages” connected to the “Occupy Wall Street” movement, hackers have been using their skills for social activism.

Hackers found the personal information of Deputy Inspector Anthony Bologna and posted it online, after the officer was accused of spraying protesters with pepper spray in a video widely circulated  on the internet. According to the NY Post, “the hackers collective known as Anonymous put out the name and personal details of a high-ranking cop who pepper-sprayed penned-in Wall St. protesters over the weekend”.

Efforts by the hacking collective appear to be focused around the strategy of releasing the sensitive personal information of its targets.

Cybercriminals Target Investment Bank CEO

by , on

The eminent need for mobile device protection continues to grow. As we’ve pointed out several times in the recent past, we’ve entered a time in history in which mobile device security cannot be disregarded. Confidential company data that is analyzed and processed through devices that are susceptible to loss or theft holds immeasurable value. It’s not just competing companies that would like to access industry secrets held within your laptop, tablet or mobile phone, but state-supported hacking organizations and foreign cybercriminal rings that might find you and your information interesting if it were worth it to them.

Lloyd Blankfein, CEO and Chairman of Goldman Sachs found himself to be the victim of cybercriminal efforts recently, according to CNET.

Hackers released the personal information of Blankfein, “including the CEO’s age, recent addresses, details of litigation he has been involved in, as well as registration information for businesses, but no sensitive information such as financial data”.

Cloud Security

by , on

We emphasize the fact that your Keeper account is encrypted from the moment that your enter data into the program, according the the key that is established when you create your Master Password. This way only you hold the key to your data secured in the Cloud Security Vault™.

“By encrypting data themselves, using software with no backdoor, sites can assure themselves of privacy. The cloud provider, government officials, and hackers cannot get at the data in usable form.” Andrew Binstock, Dr Dobb’s

You Can’t Take A Vacation From Protecting Yourself

by , on
Right now in the midst of summer, schools are out of session and the weather is heating up. Families are packing their bags and heading out of town for vacation. We came across a study this morning that analyzed the habits of travelers who work remotely while they are away from home and on vacation on their mobile devices; i.e. the types of people who are our customers here at Callpod and benefit the most from all of our products.

The study reports some interesting statistics. Even while on an official holiday, over half of all office workers stay connected to the job through email and messaging to ensure that things are running smoothly in their absence. 41% of those surveyed reported taking mobile devices on vacation for work.

51% of the laptops that travel with workers are left entirely unsecured without even a password for protection- of those, only 26% will be encrypted.

In our white paper on mobile security, we point out the protection issues inherent to mobile devices. In addition to being susceptible to loss, damage and theft, the wireless connectivity points through which these devices access mobile networks each present opportunities for malicious users to compromise the Smartphone, laptop or tablet. When passing through Wi-Fi networks in the airport, hotels, museums, restaurants and other locations on vacation, a traveler could be exposing their device and the information kept within it to a greater number of hackers.

Traveling through a foreign or unfamiliar environment, makes retaining control over the data contained within your devices considerably more vital, especially when carrying work information. The transient, anonymous nature of your vacation destination can have a dark side to it when it comes to the microdata that identifies you in your mobile device. You would never leave your office door open or your filing cabinet unlocked in the middle of a well-trafficked street, but leaving your mobile device unsecured with unencrypted information carries the same sort of risk.

Andrew Cordial of Origin Storage states that the downside of having employees who work while on vacation is “the aftermath from these industrious workers when company secrets have gone AWOL”.

“The reality is that when corporate information is accessed from a mobile device, whether it’s personal or company owned and it’s misplaced there are consequences.”

As we’ve pointed out before, the very nature of mobile devices used for work demands that there be an extra set of protection for the data secured on the device. Most importantly, your critical information should be encrypted. Usage of Smartphones, laptops and tablets is only going to increase and will soon surpass the usage of desktop computers, making it all the more critical to institute measures that will ensure that no matter where you go, your information remains secure.

Ahead of the Curve In Mobile Security Standards

by , on

We saw a video on the mobile security standards that are being developed by the National Institutes of Standards of Technology (NIST). Our mobile security software, Keeper® Password and Data Vault stays one step ahead of the standard and leads the way by having addressed the major issues that this government agency is just beginning to identifying as the most important elements of mobile security software in its key features.

Keeper Enterprise allows the administrative control of the content and data on an employee’s mobile device, meaning that access to the encrypted data stored and managed within Keeper can be remotely wiped when it is decided that the information needs to be restricted.

In addition to this infinitely valuable function for enterprise users is the flexibility of Keeper. Our developers work steadily throughout the year to not only improve the software, but to also make sure that it can be used by as many people as possible. Available in the widest platform base of any mobile security software, Keeper provides the benefit of a standard of mobile security that does not require regulating an organization to use the same mobile device.

Our application works consistently with 99% of the mobile devices and operating systems on the market, meaning that a company would not have to restrict mobile device usage but could allow their employees to use Keeper on whatever is available—while still retaining control of what is stored within it. This addresses the concern expressed within the aforementioned video regarding the statement that the “many and evolving platforms are a moving target for standards and practices”— Keeper itself evolves quickly and constantly so that you are always protected on all fronts.

The Importance of Encryption, Illustrated

by , on

The key feature of Keeper® Password and Data Vault’s mobile security software lies in the 128-bit AES encryption that the application uses to protect the data from the user end, as it can only be decoded using the password established by the user. This article illustrates why anyone who accesses or stores critical information on their mobile devices needs to protect this information through encryption.

“The consequences of leaving behind these devices is difficult to quantify, but people traveling for business or pleasure are likely to access their company’s corporate network, favorite website or online merchant, resulting in sensitive information residing on endpoint devices. If unauthorized individuals can obtain one or more of the devices left behind at an airport, and the device is not encrypted, the consequences could be severe.”

Keeper® Is On Your Side

by , on

A lot of exciting developments are in the works at Callpod. We have a some changes in the works that are designed to make Keeper better and more widely available to our users. A lot of you may have seen our requests for feedback—we’re trying to gauge the best ways to protect you based on how you use the software and what you want out of it. We greatly value and listen to our users.

In recent months, we’ve rolled out new versions for different platforms- Keeper® is still the most widely supported security software available. Our Windows Phone, Chrome and Cisco Cius versions have been finished, providing more ways to conduct your business online without being exposed to the possibility of identity theft. Keeper is gaining thousands of new users every day.

The need for protection is only becoming more imperative, as an increase in hacking of usernames and passwords has made programs like Keeper inestimably important to users. Keeper is the most feature-rich security software on the market- and for good reason. When a program that encrypts data, such as Keeper, is coupled with a long and complex password there simply isn’t enough time in the world for a hacker to gain access to your authentication information. Decrypting the data based on a random string of characters makes it exponentially harder to hack than making the fatal mistake of using common passwords on more than one site.

We’ve made it easier to protect you by adding the Password Generator feature. Can’t think of an irregular string of characters on the fly? Keeper will do this for you, in addition to managing these passwords and storing them encrypted in our Cloud Security Vault™.

Current events in hacking illustrate better than we can why and how these features benefit you. Basic defense against hackers does not need to translate to inconvenience. Our subscribers know that Keeper is a simple program- they tell us that it is clean, elegantly designed, and intuitive. More importantly, they use Keeper every day.