We're constantly being told that the internet of things is set to revolutionize the world we live in. Gartner has predicted that it will have around 26 billion units by 2020, but with this rapid growth comes added risk.
A new study from HP shows that 70 percent of the most commonly used internet of things (IoT) devices contain vulnerabilities, these include password security, encryption and personal data issues.
Today, Microsoft announces the first major update for Windows Phone 8.1, called Update 1. It introduces new features and improvements over the version which the software giant unveiled earlier this year at Build 2014, and makes way for Cortana to arrive in new markets.
In Windows Phone 8.1 Update 1, Microsoft adds Live Folders, allowing users to group live tiles on the Start screen. Like the name suggests, it is able to display updating information on its tile, coming from the items it contains. A live folder can be created by dragging a live tile on top of another.
In an ideal world there wouldn't be any viruses at all but, since there are, the next best scenario is to have an antivirus program to protect you. But what happens once it's too late? If you get a virus infection how good are antivirus and clean up tools at repairing your system?
Independent testing organization AV-TEST set out to resolve this question with a comprehensive 10-month test using 17 different software packages.
A newly uncovered flaw in Google's Android OS could leave large numbers of mobile devices at risk from malicious apps that appear to be from trusted developers.
Named 'Fake ID' by Bluebox Security who uncovered it and notified Google of its presence, the vulnerability lets malicious applications impersonate specially recognized trusted applications without any user notification. Although a patch was issued in April it's likely that many devices are still at risk.
Writing on the company's blog CTO and co-founder Stephen Boyer says, "BitSight has continued to observe evidence of system compromise inside hundreds of retailers over the course of the year. Based on our data and analysis, we observed that there were many retailers with poor performance and that this downward trend has continued into the second half of 2014".
There was widespread condemnation of Facebook when it was revealed that the social network had been manipulating users' newsfeeds as part of a social experiment. Official complaints may have been made but it doesn’t seem to have served as a lesson for other websites. Now it transpires that OkCupid -- the dating website whose slogan is "We use math to get you dates" -- has been fiddling the figures in a series of experiments on its users. The weird thing is, the site is openly bragging about it.
In a blog post unashamedly titled "We Experiment On Human Beings!", founder Christian Rudder writes that "OkCupid doesn’t really know what it’s doing". Seems like something of an odd admission. The blog post details three experiments the dating site conducted on its subscribers. There must have been more because the post is prefaced with the words "Here are a few of the more interesting experiments OkCupid has run". Does "interesting" just mean "less controversial"? Who knows?
Securing IT is essential for any modern business, but according to a new study carried out for security company Kaspersky Lab around one in four IT security experts have little or no understanding of the security options for virtual environments.
Almost half of respondents (46 percent) said that virtual environments can be adequately protected by conventional security solutions and 36 percent believe that security concerns in virtual infrastructures are significantly lower than in physical environments.
High profile hacking incidents continue to make headlines around the world. The Target data breach that compromised 40 million customer accounts is still reverberating around the retail universe, and earlier this month a hacker organization targeted CNET, the popular technology and consumer electronics site. The group claims it obtained over a million usernames, passwords and email addresses.
If you run a business and have valuable customer data to protect or even if you just enjoy visiting sites online and shopping at ecommerce hubs and want to keep your personal information safe, you may worry about hacker attacks. But there are steps you can take to reduce the risk. Here are 10 ways to keep your personal or business information safer.
Googlebots are essential to the smooth running of the search engine, ceaselessly probing websites to ensure that Google stays up to date with the latest developments and site changes.
But for every 25 genuine Googlebots that visit your site you'll also be visited by a fake Googlebot -- more than 23 percent of which are used for DDoS attacks, hacking, scraping and spamming. This is among the findings of security company Incapsula's 2014 Search Engine Study.
Cyber security woes continue to burden the minds of organizations of all sizes. This has been further exemplified by the announcement from C5 Capital to launch the first cyber security-focused venture capital fund in Europe, as concerns about leaks and digital technology securities grow.
The London-based firm is looking to raise $125 million to invest in security and data companies Europe, and highlights that the cyber security threat has certainly become a boardroom issue. Even previously well protected and "secure" industries such as the public sector have realized that they must take extra steps in order to secure their data.
Companies are increasingly keen to take advantage of the insights that big data can offer. But this does lead to problems with controlling access and keeping the data secure in a way that works with existing systems.
Big data security specialist Zettaset is now making its Orchestrator product available as a standalone offering. This will allow customers to take the whole offering or individual applications as required to customize and secure their environment.
Traditional authentication methods like passwords are vulnerable to data breaches as well as being difficult to remember and manage. But although tokens and physical smart cards provide better protection they're expensive to implement and maintain.
Security company Wave Systems Corp has a new virtual smart card solution that emulates the functionality of physical smart cards or tokens, but offers greater convenience to users, lower total cost of ownership, and a reduced risk of unauthorized use.
It has never been harder for businesses to build and preserve a relationship of trust with their customers. The rise of increasingly sophisticated, and targeted, cyber-attacks means there are more threats to watch out for than ever before. But letting just one slip through the net could spell disaster and damage even the strongest of partnerships, beyond repair. Just ask any major organization that has lost confidential customer data through a security breach.
When online retailer eBay reported that its network had been compromised earlier this year, it's no wonder that its message to customers was "the trust and security of eBay members is our top priority". The need to maintain trust in the face of a successful hack is critical.
Microsoft stopped supporting Windows XP on April 8, which means the aging operating system no longer receives security updates and non-security hotfixes, potentially putting die-hard users at serious risk.
Although XP is no longer eligible to receive security updates, Microsoft is, however, still providing users with updates to its anti-malware signatures and engine, and will continue to do so until July 14, 2015.
Cybercriminals don’t have to make their own malware these days, they can simply purchase ready-made kits. They don’t need to take out a bank loan to do so either -- malware is more affordable than you might think.
Trustwave’s security researchers did a little digging and found that depending on the type, malware can cost as little as two hundred dollars on the black market, and the tools on offer are pretty sophisticated too. Got your wallet ready? Here’s a price list of just some of the currently available malware: