Saturday, May 10, 2014

What Happened To Shared Responsibility?

What Happened To Shared responsibility?
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

What Happened to the Bond Between People, Family, Friends, Co-Workers?  It is about Got Your "6", your back.  I believe the embers are still glowing and need a little fresh air blown upon them.  

Start thinking about the Bond of Life in all you do.  Stop the negativity and be positive in your actions.  It starts with your ethics in protection of all information, no matter where or how it is stored.  

This includes your Smart Mobile Phone, Tablet, Laptops and PC/Mac's.  Yes, others are reliant on YOU!  

Straight Talking... Key Talking... (www.commsmart.us)

WE are in the NOW and
KEEP YOU; in the KNOW… 

www.commsmart.us

Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking... Key Talking…


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia


Copyright 2014

Wednesday, May 7, 2014

When asked how to simplify why we, at KEYTALK US believe why we are the authentication and secure connection for now and the future of computer security.


When asked how to simplify why we, at KEYTALK US believe why we are the authentication and secure connection for now and the future of computer security.  

KeyTalk, 2 factor authentication, acting as PKI in a Private domain at nearly zero management!

KeyTalk, a two factor authentication, using your device as the second factor generating a break-through 2SSL peer to peer communication channel over any untrusted (internet) connection. 

The user automatically receives a short lived device certificate using a corresponding key pair in the range from 2048 through 4096 bit encryption which changes automatically every next time. Short lived access keys configurable from minutes thru hours, completely transparent to the end user and standard server configurations. 

KeyTalk generates an intrusion proof data in motion channel to protect your data. 

web: http://www.keytalk.us 

email: info@keytalk.us



Old Fashion Bank Robbery Isn’t Paying Off! Would You Like a Better Paying Criminal Job?

Old fashion bank Robbery Isn’t Paying Off!
Would You Like a Better paying Criminal Job?
Please Apply!
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

Times have changed and statistically Butch Cassidy and the Sundance Kid made a fortune at bank and train robberies.  In fact they were even more profitable and safe in that line of work than today.

Believe it or not, more than $40 million US Dollars is stolen in bank robberies each year in the United States.  When you break it down, by the number of robberies, it turns out that most bank robbers get away with only about $7,700 on event. After factoring in how much the stolen money is recovered, that amount drops to only about $6,000 per robbery.

Some more Internet facts about robberies:

Commercial banks are statistically much more likely to be robbed than mutual savings banks, credit unions and savings and loan associations. In fact, there are about 5,000 robberies a year at U.S. commercial banks, compared with only about 400 at credit unions and only about 100 at savings and loan associations.

Bank robbers tend to commit their robberies at the bank counter, though a few actually go to the safe during their robbery. In 2012, there were about 75 drive-up or walk-up robberies and only six robberies from a night deposit box.
Despite the fact that more than 5,500 bank robberies took place in 2012, only about 100 people were injured — 13 of whom were the bank robbers themselves.

That has all changed, I do not want to say that some sense has suddenly prevailed, but the numbers of robberies is going down!
Bank robbers are not robbing banks anymore. They don't need guns, and they don't wear stocking masks. Instead, they are hiding behind their computer screens and covering up their digital tracks, whilst drinking lattes and sitting in shorts.

In today's world, there are multiple ways for cybercriminals to make money long before the cash is actually transferred out of a bank account. Robbing a bank has become one of the last large cogs in a much wider operation.

Online theft is almost always part of a much ostentatious scheme. Though sometimes a high-skilled individual or single group of cybercriminals will handle all parts of an operation, most cybercrime is split up into several steps, each handled by a different player.

Most bank account thefts begin with a single malware developer who sells malicious software on an underground black market to hackers.  To note, they are even available on Amazon and E-Bay and advertise openly!

On those dark channels of the Internet, criminal hackers can buy tools to steal users' bank account credentials, services to bring down websites, or viruses to infect computers.

Hiring a criminal hacker is easy, because today's malware requires hackers to have little technological knowledge to infect hundreds or thousands of computers.

And some services are fairly cheap. For instance, getting a hold of 1 million email addresses can cost just $125. That means there are more and more cybercriminals hoping to get in on an operation.

Once unsuspecting victims' credentials or bank account information has been collected, hackers may resell that data to someone who repackages it in a useful way and redistributes it on the black market.

Not all information has equal value. Often criminals are looking for credentials of wealthy individuals with accounts at financial institutions where they are familiar with the security systems.

They are also looking for fools!  Fools who leave the data door wide open and that includes IT Departments as well!

At this stage of the heist, cybercriminals may hire a "money mule" to increase what distance still exists between them and the act of cashing out. Mules sometimes use international wire transfers, make online purchases with stolen credit cards or actually go to the ATM using a stolen PIN and a spoofed debit card.

Money mules are often given a small share of the takings for their work, despite the fact that they're the easiest targets for law enforcement.
This the same work profile as drug dealers use!

So if you are interested please prove to us you are a credible and competent hacker.  We will forward your information and get you all the refines of a 6 x 9 apartment and to begin with, a nice pair of bracelets.

Protect yourselves, CommSmart US will assist in your authentication and secure connections.

WE are in the NOW and
KEEP YOU; in the KNOW…

Call: +1 (317) 426.0110
Email: info@commsmart.us


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking… Key Talking…
Secure Connections


Galveston, Texas, Indianapolis, Indiana, London, U.K., Netherlands, K.L. Malaysia

Copyright 2014

Tuesday, May 6, 2014

Are You Foolishly Thinking More About The Weather Forecast or Traffic Conditions Than Your Financial/Computer Security?

Are You Foolishly Thinking More About The Weather Forecast or Traffic Conditions Than Your Financial/Computer Security?
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.


The seriousness of Cyber-Crime seems to be missing the mark.

There are hundreds of thousands of Hackers, Phishers and Man in the Middle Brutal Attackers after your information. Not just from your computers, smart mobiles and tablets, from your action in making purchases at stores, using ATM's and accessing the corporate databases for business.

Day after day, hour after hour they are searching for fools who leave the door wide open for them to steal from you and your company and inflict harm in ways that anger you after the fact.

CommSmart US has been at the forefront of bringing notice of the issues via all mediums and some think we are just hyping the situation to sell solutions.

WRONG!

Our stable of solutions are effective and necessary, especially our foundation security with KEYTALK. All that we do is base-lined with computer security of authentication and a secure connection. There are no if, buts or wherefores regarding the threats.

To recap the KEYTALK solution:


All information being transmitted via our KEYTALK secure connections.

KeyTalk, is a two factor authentication, using your device as the second factor, the device DNA, generating a well tried and tested patented and propriety break-through with a 2SSL peer to peer communication channel.

Over any untrusted (internet) connection, which means that you are totally secure at the hotel or public Wi-Fi Hot Spot. (Note the use within a Wi-Fi Hotspot!)

The user is automatically connected, as the device DNA is recognized and receives a short lived device certificate, using a corresponding key pair between 2048 through 4096 bit RSA encryption, which changes automatically on every connection.

KeyTalk’s device authentication has the advantage of PKI, but as a Private Key.

The short lived access keys are configurable, duration, from minutes thru hours, completely transparent to the end user and standard server configurations.

KeyTalk generates an intrusion proof, end to end, data in motion channel.

Invisible, anonymous and totally secure.

Now read on from the Daily Mail on the following issue:


How thieves can use your mobile to empty your bank account via dodgy public WiFi connections and 'bluesnarfing'


Every day, hundreds of thousands of us pop into coffee shops. While we sip our cappuccinos, we may connect our smartphones to the cafes’ Wi-Fi network, and catch up with friends via services such as Facebook.

As well as socialising, we may use the time and free access to a wireless connection to get on top of our finances. That £75 you owe the plumber can be paid instantly by accessing your bank’s website or app. Transferring money from your savings account to your current account is nothing more than a few taps on your screen.

But what coffee drinkers do not suspect is that lurking among their fellow latte lovers are bank robbers. Unlike the figures of popular imagination, these thieves will not be wearing stockings over their head or brandishing a sawn-off shotgun.

Instead, the thief could be that smartly dressed middle-aged man hunched over his laptop, seemingly catching up on his emails. Or maybe it’s the student in the corner, chatting to a friend on his phone while tapping at a tablet computer.

Unbeknown to you, this modern form of bank robber is silently harvesting all your private data. The only sign of his thievery is perhaps a little smile as your bank log-in details appear on his screen, ready for him to copy and paste before plundering your account within seconds of you finishing your coffee.

In short, you’ve just been mugged — but you’ll only realise when you later go to a cash machine to withdraw some money, and discover that every penny in your account has been cleared out.

During an anxious phone call to the bank, you’ll learn that an online thief has hacked into your account and stolen all your money.

Although the bank will usually restore your balance, they won’t be able to restore the feeling of security you had before the cyber robbery.

‘When I first found out that it had happened to me I felt utterly violated,’ says Pam Clover, 40, a marketing consultant and mother-of-three from Salisbury, Wiltshire. 

‘After all, your bank details are some of the most private things you have, and somehow a complete stranger had gained access to mine. My first question was: “How had he done it?”’

Increasingly, the most likely answer to that question is through your smartphone. Although we like to think that our devices are secure, it is disturbingly easy for criminals to access them.

As the banks are not obliged to report to the police every time a breach of their security takes place, it is very hard to establish the size of the problem. However, according to internet security experts, it is a growing menace.

‘This is a real challenge for our industry,’ says James Lyne, the global head of security research for the Oxford-based firm Sophos, which provides data protection services to businesses. ‘There’s undoubtedly a lot of this type of crime going on, and it is going unreported.’

There are two main ways in which thieves can access your smartphone

One route is through your phone’s wireless ‘Bluetooth’ function, which, when switched on, allows it to ‘talk’ to other enabled devices nearby. This means that a hacker sitting near you can use his Bluetooth-enabled laptop to connect to your device without your knowledge. This process is sometimes called ‘bluejacking’ or, more properly, ‘bluesnarfing’ (from the slang word ‘snarf’ which means to eat, drink or devour).

However, this is relatively rare. The more common method is for crooks to use your smartphone’s Wi-Fi connection. They rely on the fact that most of us are blase about the security of the networks we connect to.

For example, when you are in a coffee shop, your smartphone will present you with a list of available Wi-Fi networks that you can use to connect your phone to the internet. The majority of these networks are run by legitimate companies, but sometimes they are actually created by a criminal sitting nearby with little more than a laptop.

These networks are often given innocent-sounding names, such as ‘Free Public Wi-Fi’, that gull smartphone users into logging in. On the surface, everything seems normal, and you will be able to connect just as you would with a legitimate Wi-Fi service.
However, because you have connected to a network controlled by a thief, he can monitor everything you do, enabling him to vacuum up passwords and login details for your bank account.

In fact, the process is so simple that the thieves can steal thousands of pounds in just a few hours while sitting in their local Starbucks.

In order to show just how easy it is — and quite how trusting people are — the security firm Sophos decided to set up its own Wi-Fi networks on the streets of London to prove how much data it could capture. The firm sent head of security research James Lyne to tour the capital on a bicycle equipped with its own Wi-Fi generator, under various names:

‘FreePublicWifi’, ‘Free Internet’, and even, somewhat cheekily, ‘DO NOT CONNECT’.

Within three hours, 2,907 people had connected to his network. One hundred and three of those used it to access a banking service. Had Mr Lyne been a criminal, he could have easily accessed their accounts and helped himself to their money. Even if he had skimmed just £100 from each account, he would have made over £10,000 — not bad for a morning’s work.

‘This willingness to connect to any wireless network that professes to offer free Wi-Fi, without ensuring you have some kind of security measures in place, is like shouting your personal or company information out of the nearest window and being surprised when someone abuses it,’ says Mr Lyne.

For victims such as Mrs Clover, the idea of using her smartphone — or even her computer — to access her bank account is now distinctly unappealing.

‘The whole experience has made me want to go nowhere near internet banking ever again,’ she says. ‘Yes, I know how practical it is, but I’m going to for ever worry that someone is spying on me.’

Thankfully, there are ways to beat the robbers. By far the best way is to set up your own Virtual Private Network (VPN) on your computer at home. Then, when you are using a public Wi-Fi hotspot, you can use your smartphone to connect to your home computer, and use its secure connection to the internet to access web pages safely.

However, this is clearly technically challenging and most of us would need help from an IT expert to do this. Nevertheless, Mr Lyne urges smartphone users to establish their own VPNs.

Another way to stay secure is to make sure that any supposedly secure webpages you look at feature a little padlock in the address bar, as well as the preface ‘https’ rather than ‘http’. This means that the page is secure, and not visible to others.

Third, make sure that you regularly install the suggested updates for your smartphone’s browser software. ‘This is a really boring thing to say,’ says Mr Lyne, ‘but I can’t stress it enough. These updates contain all the latest tools for combating hackers, who like nothing better than out-of-date browsers.’

Ultimately, the best defence is to use common sense, and to only access private information over the web when you are absolutely sure that the Wi-Fi network is legitimate. If you have your doubts, then put down your smartphone, and leave it for later.

Perhaps then, instead of flicking through your phone while you have your macchiato, you might talk to a friend or read that book you’ve been meaning to get around to.


 We thank Guy Walters for his insight and perspective.

KEYTALK is our security foundation for the following:

The CommSmart US’s Total Recall Solution comprises of:
  • Action In Motion software for the authorized Smart Mobile Phones/Tablets, software interface for security command data servers.
  •  Secure Comms BB which is the mobile hardware to provide 100% connectivity via mobile phone data providers and the solution.
  • KEYTALK Secure Connection
  • Certified Training for secure usage and evidence gathering.

CommSmart US’s Total Recall Solution is unique in its full security of all data, video, audio and images.

Do not ever forget this, as tomorrow never comes, it is always today…

WE are in the NOW and
KEEP YOU; in the KNOW…

Call: +1 (317) 426.0110
Email: info@commsmart.us


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking… Key Talking…
Secure Connections


Galveston, Texas, Indianapolis, Indiana, London, U.K., Netherlands, K.L. Malaysia
Copyright 2014



Monday, May 5, 2014

Authentication is One Thing, Security of the Connection Is Just As Important!

Authentication is One Thing, 
Security of the Connection Is Just As Important!
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.


Passwords have been vulnerable since the day we were introduced to them.

They say it is all about strong authentication!

What does that really mean? 

In plain terms it is authorizing and recognizing the typed in password.  Ah, but not who is typing it in!

Everyone is focusing on authentication methods, which is all well and good.  It is once they are connected that is an even more major concern. 

Is the connection secure?  Are there Hitchhikers on board with lots of viruses, malware which are going to infect the main data servers? 

We must be protected on authorization and importantly, the security of the connection!  You cannot have one without the other.

The solution required is still a two-step process with only one from the person who is logging-in.  The second step is the Device DNA, yes the device itself which has been authorized and confirmed. 

If the password is stolen or compromised, it is useless as it does not have the Device DNA accompanying it.

KeyTalk, is a two factor authentication, using your device as the second factor, the device DNA, generating a well tried and tested patented and propriety break-through with a 2SSL peer to peer communication channel.  Over any untrusted (internet) connection, which means that you are totally secure at the hotel or public Wi-Fi Hot Spot.

The user is automatically connected, as the device DNA is recognized and receives a short lived device certificate, using a corresponding key pair between 2048 through 4096 bit RSA encryption, which changes automatically on every connection.

KeyTalk’s device authentication has the advantage of PKI, but as a Private Key.

The short lived access keys are configurable, duration, from minutes thru hours, completely transparent to the end user and standard server configurations.

KeyTalk generates an intrusion proof, end to end, data in motion channel. 
Invisible, anonymous and totally secure.

KEYTALK has been brought to forefront and out of a 20 year limelight of success in Europe and is now available worldwide.

Simple security is the key, effortless installation, virtually no maintenance required and importantly, usable by all devices, applications and Machine to machine scenarios. 

Yes, a two-step process is required, not just with the reliance of a password.
 
KEYTALK is a single sign-on!

The change is not coming, it is already here, successfully securing governments, financial institutions and corporations.

Straight Talking… Key Talking… KEYTALK!


Not just with security in mind, affordability too!



WE are in the NOW and
KEEP YOU; in the KNOW…

Call: +1 (317) 426.0110




Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking… Key Talking…
Secure Connections


Galveston, Texas, Indianapolis, Indiana, London, U.K., Netherlands, K.L. Malaysia

Copyright 2014