Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Cyber thieves threat to business with new bug

Internet
Internet

A bug in systems running on Mac and Linux computers has put hundreds of millions of users at risk of their information being stolen by cyber thieves, experts have warned.

The bug, dubbed “shellshock”, has been identified as a major risk for businesses and could affect millions of websites.

But firms in the North Sea might be better prepared for the potential attacks because of their attention to risks in the workplace, an expert from KPMG has said.

George Scott, Head of Information Protection and Business Resilience for KPMG in Scotland, said the bug provides a gateway to cyber-criminals, giving them access to run programmes, copy, write and delete files without the victim’s awareness.

The flaw has been discovered in a software component known as Bash, which is a part of many Linux systems as well as Apple’s Mac operating system.

Mr Scott said: “Shellshock represents a significant threat to businesses across Scotland, including North Sea operators, particularly those who operate Unix and Mac OS systems.

“The attack itself exploits a vulnerability in a key component of webservers and it’s likely that millions of web sites on the internet could be affected.

“While there are some clear steps that will quickly and significantly reduce a company’s exposure to hackers, the scale of the task means it could take months or even longer before all vulnerable machines become fully protected.

“Like many forms of cyber-attack, Shellshock can be used to embed software in an organisation which will covertly gather all sorts of data, including contact information and security credentials, over an extended period.

“Once cyber criminals have access, they can run programs, copy, write and delete files without the user knowing it’s happened.”

He said that current anti-virus software would be limited in its ability to detect these threats.

“Prevention, though at times difficult, is better than cure,” he said.

“Sophisticated attacks can take a long time to detect and potentially even longer to eradicate.

“It’s a bit like finding that the family home has had a long-standing woodworm infestation and may need expensive treatment to correct, or in serious cases a complete rebuild may be the only option.”

But he said that North Sea operators could be “one step ahead” of other industries because of their attitude towards health and safety.

“It is commonplace for every part of an oil and gas business to undergo regular safety training and awareness routines so that it is the industry’s number one priority,” said Mr Scott.

“By adopting similar principles and approaches, oil and gas operators in the North Sea could lead the way in terms of cyber security with a lower level of investment required as the culture already exists.”

On Tuesday 30th September KPMG will host a major cyber security seminar in Edinburgh where business can learn more about the issues affecting data privacy and the practical considerations they should be aware of if they want to avoid the consequences of a major breach, such as those arising from attackers exploiting the Shellshock vulnerability.