Articles about Security

How your data will be at risk in 2015

2015 Ahead

The world of information security is, as we know, a constant arms race between the hackers and cyber criminals and the protection industry.

Since the focus has turned to making money rather than simply causing disruption it's become big business too. 2014's string of retail and other security breaches is testament to this.

Continue reading

Employees are the biggest security risk in the cloud

Cloud-security-800x450

Staff members present the biggest security risk to a company, and the most likely weak point when it comes to data in the cloud.

According to the recent State of SMB Cybersecurity report from CloudEntr, which took in the opinions of 438 IT pros across 20+ different industries, 77 percent said that staff members are the weakest link in their security infrastructure, and a liability when it comes to cloud usage.

Continue reading

Who's afraid of the big bad bot?

botnet

Web security specialist Incapsula has released its 2014 annual Bot Study which reveals that 56 percent of website traffic is accounted for by bots.

That's down from 61.5 percent on last year's study, however the number of 'bad' bots posing as humans has increased significantly.

Continue reading

Secret CoolReaper backdoor for hackers discovered in Chinese Android phones

Secret CoolReaper backdoor for hackers discovered in Chinese Android phones

China's monitoring and control of how its citizens access the internet is something that has been going on for some time. Now there is something new for Chinese smartphone owners to worry about. Security researchers at Palo Alto Networks have discovered a backdoor built into millions of handsets produced by Coolpad.

Known as CoolReaper, the backdoor potentially places more than 10 million smartphone owners at risk. The security firm conducted investigations after users complained on message boards about suspicious activity on their handsets. After downloading multiple copies of the stock ROM used on Chinese CoolPad phone, it was found that "the majority of the ROMs contained the CoolReaper backdoor".

Continue reading

Bitdefender releases free CryptoWall Immunizer

Bitdefender200-175

Bitdefender Labs has announced the availability of Bitdefender CryptoWall Immunizer, a free Windows tool which offers some protection against versions 1 and 2 of the file-encrypting malware.

The program appears to work by setting Windows policies to block programs from running when they’re in the %appdata% or %startup% folders.

Continue reading

Microsoft's view of 2015: Internet of Things, security, and machine learning

Microsoft's view of 2015: Internet of Things, security, and machine learning

Companies are always forward-looking, but it's at this time of year that this is really focused on. Consumers are excited to see what products they'll be able to get their hands on in the year ahead, businesses want to know what services the coming year has to offer, and technology enthusiasts are keen to learn about what projects are in the works.

Today, Microsoft shares its view of which areas of technology are going to be of the greatest importance for businesses in 2015. Corporate Vice President, Enterprise and Partner Group, Susan Hauser believes that security will continue to be strengthened, the Internet of Things will grow, and predictive tools will be more heavily utilized.

Continue reading

The top 10 worst security breaches of 2014

skull death security malware hack threat

Another year, another batch of damaging security breaches. It seems that as time goes on companies are becoming more and more vulnerable to hackers, viruses and malware.

2013 saw some massive data scandals in terms of records stolen, yet 2014 has trumped it with some truly staggering breaches in security. We’ve created a run-down of some of the 10 most damaging security scandals of the year.

Continue reading

35 percent of all security breaches take place in higher education

Mortar boards cloud education

Higher education institutions with their rapid turnover of students' devices each year present particular problems when it comes to protecting data.

A new infographic from enterprise security and backup specialist SysCloud looks at the risks higher education bodies face and how they can improve their levels of protection.

Continue reading

Google increases security for desktop Gmail with Content Security Policy support

Google increases security for desktop Gmail with Content Security Policy support

Google today revealed a new feature for Gmail that should help to increase inbox security. Newly added support for Content Security Policy (CSP) keeps Gmail extensions in check to ensure that none are malicious or try to interfere with your Gmail session.

It's essentially server-side malware protection for Gmail extensions, and this is just the latest move from Google that aims to increase inbox security. Email security is of interest to everyone online, but it's something that is particularly important to business and enterprise users -- groups Google is keen to keep happy.

Continue reading

Apple, Amazon, HP, Verizon and others back Microsoft's fight against US government

Apple, Amazon, HP, Verizon and others back Microsoft's fight against US government

Microsoft is currently embroiled in a legal battle with the US government, and the fight has led to an unlikely alliance between several rival companies. Microsoft was handed a government order requesting access to emails stored at a datacenter in Ireland. The company has been battling the order for several months, and now Apple, Amazon, Verizon, and HP are among the big names lending their support to the fight.

It's not just technology firms who are putting their names forward in support of the challenge of the search warrant. Several global media outlets, including the Guardian, the Washington Post, and CNN as well as numerous trade associations and advocacy organizations have signaled their support for Microsoft.

Continue reading

Interested in encrypting your data? Here's what you need to know [infographic]

padlock box secure

There is more than one way to keep your data safe from prying eyes, but the practice that is most recommended is still the use of encryption. It will ensure that only you will be able to access personal information, requiring a decryption key to unlock your data. Proving just how effective it can be, the US government basically wants both Apple and Google to allow it to bypass the encryption in the latest versions of their mobile operating systems, namely iOS 8 and Android 5.0 Lollipop, respectively, because currently it is unable to directly access that data.

However, there are quite a few things that you should also know about encryption before you decide to go down this road. To learn more about what encryption entails, you can check out the following infographic, called "Protected: A Beginner's Guide To Encryption".

Continue reading

Edward Snowden condemns Amazon's 'morally irresponsible' encryption policy -- users don't care

Edward Snowden condemns Amazon's 'morally irresponsible' encryption policy -- users don't care

In a near-perfect example of how there is always more than one way to look at things, Edward Snowden has very different views on Amazon than Amazon users do. On Friday, Snowden appeared -- as ever -- via video link at the surveillance symposium at the Cato Institute. He condemned Amazon's lack of encryption of customers' searches, referring to the practice as "morally irresponsible".

But Snowden's condemnation of Amazon comes at the same time as a study by Bizrate Insights which finds that more than 45 percent of online shoppers trust the site with their payment and personal information. So why the disparity?

Continue reading

CIO jobs at risk as mobile computing weakens data governance

mobile phone raincloud

The shift to mobile computing has led to some major changes for enterprises, not least in how the security and confidentiality of data is governed.

A new report, commissioned by data protection specialist Druva from Forrester Consulting, surveyed 205 IT and legal professionals in enterprises in the US and UK. It suggests that 20 percent of CIOs could lose their jobs in 2016 for failing to implement information governance.

Continue reading

Anvisoft Slim Toolbar 1.4 now free

SlimToolbar200-175

Utilities developer Anvisoft has released a free version of its browser security tool, Anvi Slim Toolbar.

The program provides real-time and on-demand tools to detect and remove malicious add-ons for Internet Explorer, Firefox and Chrome.

Continue reading

New partnership boosts Office 365 security

cloud security

As businesses move their systems to the cloud security becomes a major concern but often applications don't offer the flexibility and ease of access that administrators need.

To address this need for users of Office, cloud security automation company Palerra has announced a partnership with Microsoft to add an extra layer of security to the Office 365 suite.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.