Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 4 October, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Gemalto – We were not targeted, and devote all resources to investigate reports

by The Gurus
February 23, 2015
in Editor's News
Share on FacebookShare on Twitter

Gemalto has said that it especially vigilant against malicious hackers and is unable to prove a link between past hacking attempts and what has been recently reported.
 
In a statement, the SIM card manufacturer said that reports were incorrect that attacks were targeted at Gemalto, and instead efforts were made “to try and cast the widest net possible to reach as many mobile phones as possible”.
 
It said it was unable to verify findings, as it had no prior knowledge that intelligence agencies were conducting this operation.
 
“Gemalto, the world leader in digital security, is especially vigilant against malicious hackers, and has detected, logged and mitigated many types of attempts over the years,” it said.
 
“We take this publication very seriously and will devote all resources necessary to fully investigate and understand the scope of such sophisticated techniques.”
 
In the story, which was revealed by The Intercept, it was revealed that intelligence agencies from the USA and UK hacked into the internal computer network of Gemalto to steal encryption keys used to protect the privacy of cellphone communications across the globe. Documents provided by whistleblower Edward Snowden said that the hack was enabled by a joint unit consisting of operatives from the NSA and GCHQ, and gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.
 
Gemalto completed the acquisition of security vendor Safenet last year.
 
Ken Westin, senior security analyst at Tripwire, said: “The real issue here is that this appears to be done illegally with little oversight or transparency. As Governments pass laws to crack down on criminal hackers, we are learning that they in many respects are hypocrites, as such the law needs to provide protections both ways, to both protect citizens from criminal hackers, as well as our own Governments.
 
“This is critical not only to protect citizens, but also business, as a core component of business is trust. Mobile phone manufacturers, carriers all the way down to app developers require consumer trust in order to sell their products, as people need to know their communications are private. When the entire system is subverted it raises a lot of challenges for business moving forward.
 
“Mobile phone developers will need to take this latest revelation into account when they are building systems and will have to add additional layers of security into their systems to help reestablish that trust for their customers.”

FacebookTweetLinkedIn
Tags: APTattackmobilephoneSIM
ShareTweet
Previous Post

Cyber terrorists battled at BT Tower

Next Post

Lenovo says it is focusing on fixing Superfish fails, as software company dismisses “significant misinformation”

Recent News

Cybersecurity has become the fastest growing start-up sector in UK

UK SME cyber threat concerns on the rise in last 12 months as a quarter admit to being breached

October 3, 2023

The State of Cybersecurity: Cyber skills gap leaves business vulnerable to attacks, new research reveals

October 3, 2023
threat hunting

Threat Hunting with MITRE ATT&CK

October 2, 2023
Guide to ransomware and how to detect it

Guide to ransomware and how to detect it

September 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information