Articles about Security

Cloud attacks increase as the IT world looks to the skies

Cloud missiles

Moving systems to the cloud is usually seen as a safer and more secure option than running them on site. However, the findings of a new report suggest that there's no room for complacency.

The Spring 2014 Cloud Security Report from security-as-a-service provider Alert Logic reveals a significant increase in attacks carried out against both cloud and on-premises systems.

Continue reading

1Password for iOS complete rebuild, 1Password for Mac improves mini tool, sync and export

1password_ipad-200x175

AgileBits Inc has released 1Password for iOS 4.5, a major rewrite of its password management tool for iPhone and iPad. The release is accompanied by a less radical, but still relatively major, upgrade to the Mac version with the release of 1Password for Mac 4.3.

The iOS version boasts a complete rebuild with the promise of improved speed and a more accessible Search tool. Support for AirDrop sharing of items and multiple vaults created using the Windows or Mac version have also been added.

Continue reading

SX Antivirus Kit bundles all SecurityXploded virus-hunting tools

SXAntivirusKit200-175

SecurityXPloded has announced the release of SX Antivirus Kit, a collection of its system checking and malware detection tools.

Despite the name, there’s no antivirus engine here, nothing to directly detect and remove threats. The 14 bundled programs are more focused on manual detection, helping you spot any signs of malware on your PC.

Continue reading

DrDoS attacks of more than 800 Gbps predicted by 2015

DDoS bombs

According to a new report by security company Black Lotus the average size of a DDoS attack in the first quarter of this year was 2.7 gigabits per second (Gbps).

But the company is warning that a new type of DrDoS (distributed reflected denial of service) attack will see the threat of 800 Gbps or more attacks in the next year to year and a half.

Continue reading

Dell partners with DataMotion to offer email encryption

Secure email

When Dell acquired SonicWALL in 2012 it was heralded as a significant step in providing greater security to the company's enterprise customers.

It's now announced a partnership with email encryption specialist DataMotion to allow users of SonicWALL email security to encrypt their sensitive emails and attachments.

Continue reading

The most popular stories on BetaNews this past week: April 13 -- April 19

april-2014

It's nearly a week since Microsoft ended support for Windows XP, but there are still around a quarter of Avast customers who plan on sticking with the old dog a little longer. What is perhaps more shocking is the revelation that over one fifth of those surveyed had no idea that support was coming to an end! For those living more on the cutting edge, good news came for Chrome users who found that their browser of choice gained support for Office Online. Microsoft may be leaving users of Windows XP out in the cold, but this is to be expected after so long. Users of Windows 8.1 who have opted to forego the pleasures of installing the recently released Update will find that their operating system is also not supported, as no further security updates will be made available until the confusingly named Update is used to update Windows 8.1 to Windows 8.1 Update. Got it? Good! Some business users who had trouble grabbing the download have been granted slightly longer.

Post Build, following Microsoft's announcements about universal apps for Windows 8.1 and Windows Phone, app prices are changing -- but consistency seems to be an issue. The hotly anticipated Windows Phone 8.1 was released to developers, but Mihaita was on hand with a guide that allows anyone to grab themselves a copy of the latest update. If you're on the lookout for a new Android handset, Joe puts forward a compelling argument in favor of the HTC One M8.

Continue reading

Trend Micro releases free Heartbleed scanners for Android, Chrome

TrendMicroHeartbleedDetectorAndroid200-175

Trend Micro has announced the availability of two free scanners for the Heartbleed bug, meant for Google Chrome and Android. The first, a browser add-on, allows users to enter and check any specific URL.

The second, an Android app, is a little more advanced. It checks whether your device or apps are directly affected by the bug, or whether any installed apps access a cloud service which is still vulnerable.

Continue reading

Post Heartbleed, Tor could significantly reduce capacity -- but is it enough?

heart-attack

It seems that there have been few big names left unaffected by the Heartbleed bug in OpenSSL. Google may have rushed to patch the flaw, but the number of websites and services that fell foul of the discovery is staggering. It seems that even stalwarts of security are finding themselves in troubled waters, and this includes anonymizing service Tor.

Put very simply (very, very simply!), Tor works by not only encrypting data that is transferred online, but also bouncing it around a number of servers, making it all but impossible to trace to a particular user or computer. It transpires that some of the Tor nodes that are used in the process are running versions of OpenSSL that are vulnerable to Heartbleed, and this has led to calls for the affected nodes to be closed down. Writing to the Tor mailing list, developer Roger Dingledine suggests that up to 12 percent of the network's capacity may be lost if all of the vulnerable nodes are taken offline.

Continue reading

Your repeat offenders aren't the insider threats

Insider threat

Almost every organization today has employees that regularly violate standard security policies and protocols. However, oftentimes these violations aren’t the work of a malicious insider -- they’re usually the actions of an employee trying to do his/her job or taking a shortcut to get the job done. Corporate information security teams have the challenge of determining the motive behind these violations. While network monitoring security tools and InfoSec point-solutions are designed to help catch these infractions, they can, and do, unintentionally create an immense volume of work by flagging every policy violation as a threat -- creating thousands or even hundreds of thousands of security events to sift through daily. To make matters worse, these events are often labeled as high-urgency alerts.

The challenge is empowering your IT security teams to identify and respond to the most urgent threats while maintaining compliance with industry regulations.

Continue reading

How the cyber threat landscape is evolving -- Comodo security [Q&A]

Threats

In recent years the threats faced by both individuals and businesses have changed thanks to the adoption of new technologies like the cloud, a shift towards social engineering attacks, BYOD and more.

We spoke to Egemen Tas, vice president of engineering for leading certificate authority and security software provider Comodo to get his view on current threats.

Continue reading

Emsisoft, Kaspersky top AV-Comparatives' Real-World Protection Test

AVComparatives200-175

Independent security testing lab AV-Comparatives has revealed a summary of its March 2014 Real-World Protection Test, where top antivirus products are exposed to a test set of 1,264 current threats.

Topping the chart this time were Emsisoft Anti-Malware 8.1 and Kaspersky Internet Security 2014, both blocking 99.7 percent of threats with no false positives at all.

Continue reading

Mobile kingpins embark in fight against smartphone theft

espionage hacker thief black hat

Even though technology has advanced tremendously in recent times, smartphone theft or loss continues to be an area which has received little attention from the big players in the industry. And, it is not difficult to see why, as they stand to profit from people's misfortune or mistakes.

While we can track smartphones and delete any personal data remotely, most handsets do not have a kill switch, which means the people who stole or found a handset may be able to use it freely. However, that is set to change, as CTIA has revealed top players in the mobile industry have, finally, decided to fight on behalf of consumers, by employing countermeasures.

Continue reading

Moka5 launches new centrally-managed end-user computing tool

Centrally managed desktop

Enterprises put a lot of time and effort into protecting their servers but what happens on the user desktop always presents a potential risk and can be hard to control.

End-user computing specialist Moka5 is aiming to tackle this with the launch of its Vanguard Moka5LivePC v 4 product. This offers a locally executed live PC container that can be managed centrally.

Continue reading

Windows 8.1 without Update will no longer receive security updates

Security breach

Microsoft has trouble convincing Windows users to upgrade to newer versions of the operating system, even when the update is free of charge. Windows 8 still has a larger market share than Windows 8.1, according to the latest NetMarketShare data, even though the latter is better and can be installed without paying a dime.

So that Windows 8.1 Update does not follow the same path, Microsoft has announced it will no longer make security patches compatible with Windows 8.1 installations which do not have Update applied. It is the new Microsoft, everyone.

Continue reading

Windows XP user survey shows little hope for change

Windows XP

Last week was the much talked about XPocalypse, meaning support came to an official end for XP, despite a large number of users, both home and business, still running the operating system. It seems that this setback isn't doing much to daunt those users, either.

Security firm Avast has released a survey it conducted just before April 8th, and results will be disappointing to Microsoft. Many customers plan to stick it out with the aging platform.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.