Ian Barker

Bitcoin will do nicely -- the state of Russian cyber crime

Russia flag magnifier

Banking fraud is down, mobile threats are up and cryptocurrency is the preferred payment method in the world of Russian cyber criminals.

Fraud prevention and cyber crime investigation specialist Group-IB has released a report on the Russian high-tech crime market in 2014. The report provides detailed assessments of the who, what, where and how of high-tech crime, who is behind what crimes, where they originate and who they target.

Continue reading

Intronis ECHOshare brings simple, secure file sharing to SMBs

File sharing

Sharing files among employees can be difficult for any business, but particularly for smaller ones which often end up adopting solutions like emailing attachments or using public cloud services.

These approaches can put data at risk and also cause problems for support staff. Backup and disaster recovery specialist Intronis has a new solution to help businesses share files safely in the form of ECHOshare.

Continue reading

Organizations struggle to balance security with systems integration

scales of justice

Many organizations are failing to meet data security and governance requirements according to a new Ovum survey sponsored by data flow specialist Axway.

The results reveal that 23 percent have failed a security audit in the past three years and 17 percent lack confidence in their ability to pass one today. It also puts the average cost of a data breach at $350 per record.

Continue reading

Why hackers love the holiday season [Q&A]

Credit card gift bow

Recent high profile security breaches involving retailers like Target and Neiman Marcus mean that people are increasingly aware they may be vulnerable when shopping online. Yet many don't fully understand the landscape that lies behind hacking and why it’s such a lucrative business.

With Christmas and its associated e-commerce peak fast approaching we spoke to Kelly Yee, Vice President of secure email provider Penango who has a wealth of security systems experience in both the public and private sectors. Here are her views on how hackers work and how we can guard against becoming victims over the holiday season.

Continue reading

Dropbox passwords held to ransom after third-party leak

Cloud box

Hackers claim to have stolen the login details of almost seven million Dropbox users. Having released a teaser file on Pastebin with details of around 400 accounts they’re offering to release more in exchange for a Bitcoin ransom.

Like the Snapchat photo leak it seems that this information has come from insecure third-party services rather than from Dropbox itself.

Continue reading

100,000 mostly dull photos leak online -- behind the 'Snappening' hype

SnapChat

After all of the recent stories related to the Fappening you could be forgiven for thinking that stories about leaks of nude photos were becoming passé.

That didn't stop the media going into overdrive at the weekend when news emerged of 100,000 (or 200,000 depending on where you read the story) images from disposable message service Snapchat being leaked online.

Continue reading

Free tablets for UK pensioners as Argos promotes digital skills

Argos digital skills workshop

We're increasingly becoming a digital society, yet almost one in five people in the UK lack digital skills and 52 percent of those are aged over 65.

In an effort to provide practical skills and access to technology, catalog retailer Argos has partnered with digital skills charity Go ON UK to offer workshops to 10,000 adults.

Continue reading

SAP and Birst team up to deliver cloud analytics for the enterprise

Enterprise data

Enterprise software specialist SAP has announced a partnership with business intelligence company Birst to deliver faster analytics on the SAP HANA cloud platform.

The tie up will allow organizations to use a single cloud platform which can deliver instant analytics giving managers the ability to more quickly turn insight into action. It brings together SAP's next-generation cloud platform and Birst's comprehensive two-tier data architecture to provide instant access to business data.

Continue reading

Is it the end of the line for the password?

passwords

In an era of increasing security threats the password is often the weakest link that allows attackers a way into a system posing as a legitimate user.

A new infographic from security company Ping Identity looks at the problem of poor passwords and how in the future they may give way to more sophisticated forms of authentication.

Continue reading

New public cloud backup cuts the cost of protecting data

cloud computing backup

Backups have traditionally involved removable media, whether tape or disk, to allow copies of essential information to be held off site for safety.

The cloud has changed all that but companies still have concerns about security and retention of data, as well as expense. A new product released today by Druva is aimed at delivering a long-term storage solution with less complexity and lower cost.

Continue reading

The Thing from the Internet -- and why we’re scared of it

Monster and PC

According to a new survey UK consumers increasingly fear the pace of change they face and are particularly cynical about the need for connected, "Internet of Things" devices.

According to the survey of over 1,600 consumers by UK-based audit and accounting specialist KPMG, more than half of people (58 percent) resent the idea that computers seem to run their lives. Also 70 percent suggest that with the marketplace flooded by inter-connected devices, it's too easy for things to go wrong. The survey reveals a hankering for a return to 'simple' technology. Many, for example, mainly want their phone to make calls (54 percent) and the majority think that more advanced internet-based products such as smart fridges which self-order food or cookers reminding owners about recipes aren't needed.

Continue reading

Big data helps with detection of cyber attacks

cyber attack

The main problem that organizations face when combating cyber attacks is that they don't know what to look for and find it difficult to interpret all the data they get from their networks.

Big data analytics company Exabeam has a new product that can cut through the forest of data to make it easier to detect attacks and insider threats in real time using existing security information and event management (SIEM) details.

Continue reading

Professionals believe their Java apps are secure despite relying on third-party code

Java code

Almost two-thirds of senior IT professionals say that their enterprise Java applications contain 50 percent or more third-party code.

These are findings from application security company Waratek based on a survey of attendees at last week's JavaOne conference. However, despite recent high profile vulnerabilities in third-party code, like Shellshock and Heartbleed, nearly 80 percent of respondents still believe their java apps are secure.

Continue reading

How US organizations are losing the cyber war

Cloud missiles

Cyber crime, hacking and data breaches have seldom been out of the news in 2014, but just how well are organizations coping with it?

Not very well, according to a new infographic released by security solutions company CSO that's based on the results of a survey of over 500 private and public sector executives and security experts.

Continue reading

New dedicated tool makes for easier Spark monitoring

Data search

The Apache Spark framework is a popular add on to Hadoop for handling big data, particularly for building machine learning algorithms.

Until now though it's been hard to effectively monitor Spark performance. That's about to change as Brooklyn-based performance management company Sematext is launching its SPM for Spark.

Continue reading

Ian's Latest Tweets

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.