Articles about Security

Comodo offers companies free forensic analysis to fight zero-day malware

hacker malware

Because it isn't detected by traditional, signature based anti-virus solutions, zero-day malware has the potential to wreak havoc in businesses of all sizes.

Cyber security company Comodo is launching a new, free forensic analysis service to help enterprises discover previously unknown and undetected malware that could cause serious security issues or data breaches.

Continue reading

New software simplifies BYOD management


The US mobile workforce is set to grow to 105.4 million workers by 2020 according to IDC and this creates a challenge for businesses trying to control and secure deployments.

In a bid to make things easier, networking solutions company Brocade is launching its latest Ruckus Cloudpath platform to enable IT organizations of any size to easily establish secure, policy-based access for wired and wireless devices.

Continue reading

How to fix the Dirty COW vulnerability on Raspberry Pi


Dirty COW is a privilege escalation vulnerability found in the Linux kernel. Although it’s been there for nine years, it’s only recently been identified.

The vulnerability, which affects the 'copy-on-write' (COW) mechanism, can be found in most Linux distros, and since the Raspberry Pi runs Linux, it too is at risk.

Continue reading

Dyn DDoS attack used Chinese firm's unsecured IoT devices

DDoS keyboard

Following the large scale cyberattack that took down a number of high-profile sites last Friday, a Chinese electronics component manufacturer has admitted that its products were used by the attackers behind the disruption.

Hangzhou Xiongmai Technology, which produces DVRs and internet-connect cameras, has come forward to acknowledge that its products were exploited and that the attackers had taken advantage of security vulnerabilities resulting from weak default passwords.

Continue reading

Millennial behavior puts federal IT systems at risk

Federal government

The security habits of the millennial generation could be putting federal IT systems at risk, if agencies don't adjust their cyber defenses in time.

This finding comes from a new study by cyber security company Forcepoint, which examines how members of the millennial generation use technology.

Continue reading

The seven IoT devices that could be putting your business at risk

Risk dial

We've already seen concerns about the threats Internet of Things gadgets may pose in the home, with hackable Barbie dolls and snooping Smart TVs. Not to mention that the latest Dyn DDoS attack was carried out using unsecured IoT devices.

IoT devices are starting to become commonplace in businesses too so the potential for problems can only grow. Security company ForeScout, along with leading ethical hacker Samy Kamkar, has been investigating the risks these devices pose.

Continue reading

New tool offers SWIFT network protection through deception

Shadows street

Attacks on the inter-bank SWIFT system have been making the headlines this year, proving lucrative for the hackers and worrying for the industry.

Help is on the way though as Cyber security company TrapX is launching a deception-based security solution, DeceptionGrid, specifically designed protect SWIFT.

Continue reading

Thycotic launches free tool to expose endpoint threats

Hidden threat

We're seeing attacks on endpoint systems becoming more common and increasingly clever. Yet for administrators knowing what's happening on their endpoints presents a challenge.

Privileged account management specialist Thycotic is launching a new, free Endpoint Application Discovery Tool to automatically discover and reports on applications installed on Windows endpoints.

Continue reading

Rowhammer memory attack can root Android phones in seconds


Smartphones from LG, Samsung and Motorola are all vulnerable to an attack that makes it possible to gain root access in a matter of seconds. Known as Rowhammer, the attack works using a bit flipping technique that exploits a vulnerability in the design of RAM chips.

Because the attack takes advantage of a physical aspect of design, it is going to be difficult to quickly devise a fix. In the meantime, millions of smartphones are at risk of compromise in what could be as large an issue as the recently-discovered Dirty COW bug -- and there's an app you can use to check if you are at risk.

Continue reading

Say, what's going on at Intel Capital Global Summit 2016?


San Diego, Calif. As a general rule I never connect to public WiFi networks, which is fine except when attending an event at a hotel ballroom where T-Mobile cellular is like an apparition dancing around a Halloween grave. So as Wendell Brooks, CEO of Intel Capital, begins his speech, I sit typing narrative offline rather than tweeting live. There’s irony, I suppose, reporting old style, about investments in new innovations.

Welcome to the trials and travails of the Intel Capital Global Summit, which kicks off today and goes through October 26. Looking at the lineup, I expect to hear about newfangled tech that would make news reporting so much easier if available—although 4G cellular data would be good enough for today.

Continue reading

Businesses find IoT devices hard to secure

Keyboard unlock open lock button pin

Internet of things (IoT) is expected to make an enormous impact on pretty much every industry in the upcoming months and years, but it seems as organizations don’t really know how to secure their devices. This is according to a new report by ForeScout Technologies, which surveyed 201 senior IT decision makers in the UK, Germany, Austria and Switzerland.

First, the report says the threat surface is going to increase dramatically. An average business will operate 7,000 IoT devices in the next 18 months, which is "far more" than what the average company is used to securing and defending. Second, almost two thirds (65 percent) have "quite", "little", or "no" confidence in identifying and controlling their IoT devices. And third, the biggest challenge seems to be having IT functions working together.

Continue reading

Adding facial recognition to mobile helps reduce fraud

Biometric scan

Doing more of our day to day transactions online increases the risk of falling victim to some kind of fraud. Increasingly therefore companies are turning towards biometrics to ensure users are who they say they are.

Digital verification company Jumio is adding biometric facial recognition to its Netverify product to verify users on mobile devices.

Continue reading

Few UK banks offer two factor authentication

Two factor authentication

According to new research from the consumers' association Which?, a number of major UK banks have failed to protect their customers online by not adopting two-factor security, which greatly protects against online banking fraud.

The association tested the customer-side security of 11 banks, revealing that over half had failed to implement two-factor ID checks on customers when they logged into their accounts. Lloyds Banking Group, Lloyds, Halifax, Bank of Scotland, Santander and TSB were the banks which scored the lowest on the tests conducted by Which?.

Continue reading

Serious Dirty COW bug leaves millions of Linux users vulnerable to attack


A vulnerability discovered in the Linux kernel has been present for nine years, and users are being advised to seek out and install a patch as soon as they possibly can. Dubbed Dirty COW, the bug is a privilege escalation vulnerability which can be found in just about every Linux distro out there.

Discovered by security expert Phil Oester, Dirty COW is described as one of the most serious bugs of its type ever found in Linux. Assigned the code CVE-2016-5195, there is evidence that the vulnerability has been exploited and a website set up to alert people to the problem advises that the "security community should deploy honeypots that entrap attackers and to alert about exploitation attempts".

Continue reading

Amnesty International ranks message apps according to privacy -- Facebook wins!


Despite a desire to be more connected than ever before, people are simultaneously more concerned than ever about their security and privacy. This is certainly true when it comes to messaging tools, and the privacy features offered by a particular app or service can be what sways your decision to use it one way or the other.

Justice group Amnesty International has spent some time analyzing the privacy and encryption found in a number of popular messaging tools and compiled results in a ranked list. The findings make for interesting reading, not least because Facebook is ranked the most highly.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.