Saturday, March 8, 2014

Computer Security, It Is All About Connections! Cyber Snake Infiltrates Ukraine Networks

Computer Security, It Is All About Connections!
Cyber Snake Infiltrates Ukraine Networks
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

You can have the most sophisticated software in the world, but if the lock on your front and back doors is either cheap, flimsy or non-existent, the opportunist are inside and doing anything they want!  

Cyber-Terrorists love doors that are left ajar.

It is all about battening down the hatches in the storm of hacking, phishing and man in the middle brutal attacks.  You have got to be water-tight, in fact better than a duck’s rear end!

Sam Jones, Defense and Security Editor, The Financial Times reports:

“An aggressive cyber weapon called Snake has infected dozens of Ukrainian computer networks including government systems in one of the most sophisticated attacks of recent years.

Also known as Ouroboros, after the serpent of Greek mythology that swallowed its own tail, experts say it is comparable in its complexity with Stuxnet, the malware that was found to have disrupted Iran’s uranium enrichment programme in 2010.

The cyber weapon has been deployed most aggressively since the start of last year ahead of protests that climaxed two weeks ago with the overthrow of Viktor Yanukovich’s government.

Ouroboros gives its operators unfettered access to networks for surveillance purposes. But it can also act as a highly advanced “digital beachhead” that could destroy computer networks with wide-ranging repercussions for the public.
Cyber warfare experts have long warned that digital weapons could shut off civilian power or water supplies, cripple banks or even blow up industrial sites that depend on computer-controlled safety programmes.

The malware has infected networks run by the Kiev government and systemically important organisations. Lithuanian systems have also been disproportionately hit by it.”

“Ukraine is top of the list [of infections] and increasing,” said Dave Garfield, managing director for cyber security at BAE, who added that the instances were almost certainly “the tip of the iceberg”.

All IT Departments have software to detect these types of attacks, sadly it is after they have got into the system and infected the data servers.  

Yes, RE-ACTIVELY the work starts, a little late!  

PROACTIVE measures must be in place, you must slam the door shut!  

Meaning you have to have a secure connection and only allow those approved through the your door.

Immediately you are thinking PASSWORDSWrong!

A password is an insecure human element that is the hands of the most accident prone individuals.  Forgotten, stolen and used over and over again for a myriad of reasons.  Firstly, access to more than one account.

Why?  It is because we are lazy and take short cuts and thieves like that!

Hackers and Phishers are looking for turmoil, distractions and that low hanging fruit to attack and make your life and those connected to you a misery.

KEYTALK will stop that!  We lock the door and throw away the key, well the demand to use a password that is. 

Although a password can still be used, it is not really the key that will open the door.  It is the creation of a bomb-proof tube that connects end to end and all information now travels in a totally secure environment.

That Data in Motion is the most vulnerable as that unsecured open door allows in all types of miscreants with tools to take down your systems and spread harm to all you come in contact with via the Internet.  

Remember we are all connected!

To explain and also inform, you can bring any device to KEYTALK, all are protected.  

A user may have several devices, Desktop PC/Mac, Laptop, Tablet and Smart Mobile Phone, each and every one will have a secure connection.

When the device is trusted, a password is not needed anymore. 

KeyTalk takes a DNA overview from your device based on a minimum of 10 and up to 17 components. When the device is known a key, a (short lived certificate) is sent to your device automatically when needed to complete the transaction or to stay on-line with your enterprise data transaction. With the certificate, KeyTalk creates a 2 way SSL connection excluding the man in the middle attacks.

Many organizations use KeyTalk to connect to the device in just a few minutes and to the enterprise, using a Single Sign On as a bonus.

Management and installation of the systems is simplistic.  When we have a massive volume of users and devices, with KeyTalk  corporate integration are completed in a far shorter period compared with any other security change.  

We mean far shorter!

For more information email us, we will send you a link to see this in action.


WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Friday, March 7, 2014

Do You View Life, Business, Other’s Success And Information In A Positive Or Negative Light?

Do You View Life, Business, Other’s Success And Information In A Positive Or Negative Light?
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

Life is full of unsocial curmudgeons, detractors and those that see black when you see white.  They can never see the wood for the tress when standing in a forest. These are the same people who never invoke the security on their Wi-Fi router and hacked, blaming their Internet provider.

These are the same people who, seeing something that has a positive effective, proven and absolutely useful, knock the crap out of it, in the most negative way.  Basically wanting to goad the successful creators to reacting, and we do!

I remember when, in 1976, I invested in my first venture into technology, a computer company.  Friends told that machines will never take over or be useful.  They even used that wonderful expression, “it will do what?”  Back then, it was like buying a car but there was nothing to fuel it.  All the hardware you wanted but no software programming, we had to start from scratch and we did successfully!

Bringing it forward 38 years, which have been tumultuous in terms of what we now do with the computer and the good and bad effects that are spoken about each day and what do we have?  Great products, opportunities and then absolute morons who want what we have worked for and they want it for free!  This is after all the Information Age, and all of us have information and data that is of great value stored on our devices.

We are all connected by the Internet, yes, you are connected on a personal level to Jimmy Fallon, Brian Williams, David Cameron, Vladimir Putin.  Business wise, Warren and Jimmy Buffet, Netflix, E-Bay, the CEO of the company you work for and the government.  The connection is, we all have stuff that needs protecting from the bad guys, the Hackers, Phishers and Man in the Middle Brutal Attackers.

Through Linked In and other sources, our successful group of companies that we work with, introduced to America and the rest of the world, to KEYTALK.  Not new, in fact over twenty years old, working away in Europe protecting corporate data. 

No, not encryption, which is so over used by so many.  What is it? It is a secure connection, an unbreachable bomb-proof tube that connections and transfers end to end enterprise data in motion.

Paranoia has set in and everyone is nuts about what needs to be encrypted. 

Most of what is transmitted in our social lives does need 007 encrypted transmission!  If you do, we encrypt the connection at all levels, 4096 bytes and beyond.  Secure enough?

What has amazed us on both sides of the pond is how we have been challenged on what exactly we have perfected in data security for us all.  Not just for business, for all us and the dark secrets we all hold or wished we held!

Those in Data World, which is Kevin Costner’s new movie, the IT Department people are doubters for one simple reason, they look too deep into the effect and process.  Even when you explain, without informing of the actual science behind it, which is patented and proprietary information, they still are not understanding.

Why can’t people accept that what we say, is what we say and it works?

So, to some questions we are asked, here are some examples:

“Why are we all wanting to make it so complicated is this easy to install?

When the device Desktop PC/Mac, Laptop, Tablet, Smart Mobile Phone are trusted, a password is not needed anymore. KeyTalk takes a DNA from your device based on a minimum of 12 or up to 17 components. When the device is known, a key, a (short lived certificate) is sent to your device automatically when needed to complete the transaction. When the transaction is done, the key will disappear. With the key, a 2 way SSL is setup for a 100% hack free connection. Because the keys are distributed automatically. The Total Cost of Ownership (TCO) is unbeatable!”

So how is this setup in the first place? 

“It is simple, when a user is connecting to a source or company the first time, he or she have to register his or her credentials as always. After the user is approved, a confirmation mail or letter is sent including a URL or otherwise to connect to the KeyTalk server.

When connecting; KeyTalk immediately will secure this communication sending a temporary certificate before pulling the Device’s DNA. This by the way is an automatic procedure.

Once the DNA is stored in “HASHES”, the device, therefore the user, is trusted until the user will be deleted. The administration is able to configure the certificate on duration and rights to build a tailored private CA.

Only the user and the administration knows the KeyTalk window set and for how long it will be operational. This way we were able to pull device DNA’s from 60,000 devices in less than two hours for the European Military. This same procedure works for Machine to Machine as well!”

Where is the server?

The KeyTalk server is anywhere you want it to be, off premise or on premise, virtual or physical. The Device DNA of the at least 10 to 17 components is stored in Hashes and therefore unreadable and unusable for others.

We only store the hashes, no data. The KeyTalk keys are sent to the trusted device to set up a secure connection between client and server and the data in motion is protected by our patented encryption layers. This is bomb-proof tube that is the end to end enterprise data in motion.  The authentication is done based on the devices stored components. The user can use any authentication system to get access to log on to our KeyTalk front end which can be embedded in an app or application using our SDK.

The local device does not store a hash because the components are already in! To hack the system you need the user authentication plus the device otherwise you will not get any connection or transaction started. All of this is completed fully automatically, with practically zero management.

The NCC Group in Europe tested KEYTALK and it passed and performed as stated to full satisfaction in 2013.

NCC Group (LSE: NCC) is an information assurance firm headquartered in Manchester. Its service areas cover software escrow and verification, security testing, audit and compliance, and website performance and software testing. NCC Group tests worldwide."

Uses?
  • All corporate enterprise data transportation in a total secure environment, including:
  • BYOD (Bring Your Own device)
  • Standard information
  • Emails
  • Statistics, facts, figures
  • Financial information, including bank card transactions from Point of Sale (POS) or online
  • Vendor password database access
  • Any SaaS Application
  • Loyalty Programs (Retail, Hotel etc.)
  • Law Enforcement field inquiry and returned results
  • Military devices (including UAV)
  • Ability to use in a Public Hot Spot or Hotel environment securely and anonymously


WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Tuesday, March 4, 2014

It Is Not What You Say, It What Is Written, Stored And An Extremely Valuable Asset Of Us All!

It Is Not What You Say, It What Is Written, Stored And An Extremely Valuable Asset Of Us All!
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

The News Again Yesterday regarding a new Android Mobile Phone, The Black-Phone From Silent Circle Is Only Dealing With Phone Calls and For An Extra Subscription, You Can Have Outside Your Circle Text Messaging with Security As Well.  

It is Not About What You Say, It Is About What is Written, Stored Corporately, Interconnected Personal Information.  

Listening In to Mobile Phone Calls Is Required In Association To Terrorism. Which In Turn Leads To The Written Word.  

Data is accessed By Hackers, Phishers & Man In The Middle Brutal Attackers 94% of the Time, In Relation To Voice. 

Data, It is Physical, Touchable and Extremely Valuable!

KeyTalk Is Not a Silent Circle and Restricted to Mobile Phone Calls & Text Security, We Do Not Want To Sell You a New Mobile Phone.

KeyTalk, Protects You From Who Wants Your Data! 

Let NSA's Listening Posts Utter Silent Screams, Whilst KeyTalk Protects the Important Matters, DATA

We Are A Dutch Company and Now In The USA, With A Successful Track Record...

Oh, We Work On The Majority of Existing Mobile Smart Phones, Desktop PC/Mac, Laptops and Tablets.

Straight Talking, Key Talking… KEYTALK!

Watch the Extract From One of Our Webinars and Understand Our Inexpensive, Cost Effective Secure Proven Solution.


https://www.youtube.com/watch?v=wgWSNRQJwNw

WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Monday, March 3, 2014

Wake Up! 0101010001001

Wake Up!
0101010001001
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

Fixing Computer Security for Data in Motion is so simple and extremely inexpensive than clearing up the mess.  Sadly many cannot see the wood for the trees! 

It seems most are oblivious to what is available and why we desperately need to change how we protect our information, from the Data in Motion aspect, which is the majority and make our connections secure.

A Password to gain access is WRONG, you cannot trust just a password.  

The log-in system on a SaaS application has no idea who has typed it in. Is that really the true owner? It is open season on passwords!

We must have a trusted computer DNA, that is, the device, Desktop PC/Mac, Laptop, Tablet or Smart Mobile Phone as the token, not a person typing one in for access.  It could be anyone who has stolen the password and then using it to access the data.

It is all about a secure connection!

Netflix, Spotify, Sales Force databases and the like, who rely solely on a password log-in are giving their customers/clients a false sense of security. 

They are unsafe, unstable and insane to still being used!  It is not their fault, it is the way we have been doing it since the Internet got so popular.

Anything that is a SaaS software applications is a dire risk.  When you have any Data in Motion or In-Transit it is there for the taking.  It is the Hackers delight!

Just ask Target, Neiman Marcus, Michaels, Sears, Barclays Bank, Salesforce solutions, and the others that will not admit they have been hacked and abused.

The education system, including universities, colleges, training facilities and school districts all are major risks.  They are all low hanging fruit and easy pickings to hacker armies.

330,000 + social security numbers stolen through hacking from the University of Maryland, 146,000 + records accessed at Indiana University and more every single day by computer terrorists.  They say there are 360,000,000 stolen records and counting up for sale as we speak!

Students are not the savviest individuals and have not yet developed the life experience and are gullible to hacking, phishing and man in the middle brutal attacks.

Retail is a serious problem, no matter whether you swipe your card in a Big Box Store, on-line or even over the telephone, the chance of hacking is massive.  It includes any transaction that uses a bank card!  A magnetic card with a pin number security is so outdated and needs revision now!

It is not IF you are going to be hacked, it is WHEN!

Corporate vendor databases are all password driven and as the hacking of Target showed, one was stolen and then used to place the software thievery within Target's system.  The rest is history and will continue…  

Just look at the loss of 46% profit for Target in the 4th quarter and the ongoing expense for Credit Protection for their hacked customers.

The operators of these applications are letting you down and making the personal information vulnerable for theft.  Your concerns must be directed at all that are operating computer systems where your information is at risk.

The message is clear, it is a major problem 
and we must all wake up!

Now, do not attack the messenger, KEYTALK, has a truthful and strong message that computer security is unsafe. 

KEYTALK has the solution, proven over and over again and available in a very cost effective fashion.  The installation with existing system is simple and then the management is even simpler.

Penetration tests, performed by the ethical hackers of the NCC Group, proved beyond any doubt that KeyTalk's product lives up to its security claims.

NCC Group (LSE: NCC) is an information assurance firm headquartered in Manchester, England. Its service areas cover software escrow and verification, security testing, audit and compliance, and website performance and software testing. NCC Group has over 15,000 clients worldwide.

KEYTALK will allow your IT departments to be Proactive on the work they should be doing.  Not Reactive and always behind the problem.

Corporate America, your customers/clients, databases and corporate information deserves to be protected with a secure connection, not some silly password that gets passed around and you do not know who is using it.



Below are videos that you can view and 
understand our secure connections solution.






WE are in the NOW and
KEEP YOU; in the KNOW…


Call: +1 (317) 426.0110



Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF

Copyright 2014