Articles about Security

AI-powered chatbot helps combat cyber attacks

Endgame Artemis

The key to defeating cyber attacks lies in being able to make the correct response in a timely manner, but frontline security staff may lack the skills or resources to spot problems early.

Endpoint security company Endgame is launching an intelligent assistant built to automate security operations analyst actions and guide users of any skill level to detect and respond to advanced attacks.

Continue reading

Data breaches up by 40 percent in 2016

Data breach wall writing man

The last year has seen fewer of the large scale breaches that made the headlines in 2014 and 2015, but that doesn’t mean the problem has gone away.

A new report from CyberScout and the Identity Theft Resource Center (ITRC) has found a 40 percent increase in the US with a total of 1,093 data breaches in 2016, up from 780 in 2015.

Continue reading

Hacking group uses Google services to control malware

Hackers laptops

Carbanak, a powerful cyber-crime group, is using certain Google services as command and control for its malware and other malicious elements. The news was released by cybersecurity firm Forcepoint this week.

Forcepoint uncovered a trojanized RTF document, which, once ran, will "send and receive commands to and from Google Apps Script, Google Sheets, and Google Forms services."

Continue reading

Privacy warning: Meitu photo app is spyware sharing your phone's data

meitu

There has been a sudden craze for freaky-looking photos created using the Chinese app Meitu. The images the app creates are either cutesy or horrific, depending on your point of view, but it's what's going on in the background that has people concerned.

While Meitu has been popular in China for several years --amassing a huge following -- it has only just caught on over here. What many users are unaware of is that while they are busy applying virtual makeup to their face in the app, data such as a phone's IMEI, Mac address, users' precise location and much more is being gathered and shared. The advice? Ditch the app if you're concerned about your privacy.

Continue reading

We know email can be hacked, but what could be next? (Shhhh it's voice)

voicecomntr

If you are like most people, you are beginning to wonder if anyone has even a tenth of a clue about how to protect email. We all watched, for example, as reams of stolen political correspondence from a major email provider were posted each day leading up to the recent election, more than likely influencing the outcome.

And we all watched as another major email provider lost 500 million accounts to hackers who seemed to barely break a sweat in doing so. And, as if that’s not bad enough, the criminal underground put these swiped email goods up for sale at about a millionth of a cent per user account. Sadly, that’s just how trivial the bad guys think it has now become to break into our email. Criminal theft of email has officially become commoditized. The old Pony Express was safer.

Continue reading

Younger workers are a major security threat to enterprises

office workers

It is now normal for technology companies, media and telecom companies to be victims of either fraud or cyber-attacks, a new Kroll report says.

Almost four-fifths (79 percent) of companies were victims of fraud in the last year, with physical assets or stock being most sought after (35 percent). Cyber-attacks were no less dangerous, with 77 percent claiming to have been victims. These attacks are mostly virus or worm infections.

Continue reading

Consumers are starting to get the message on phishing

Phishing magnified

According to a new report from security awareness training company Wombat Security, people are starting to get the message on phishing.

When asked, 'What is phishing?', 65 percent of those surveyed in the US answered correctly. Ransomware remains a bit of a mystery for many, however, 52 percent were not even able to hazard a guess in response to 'what is ransomware?'

Continue reading

Few consumers believe it's their job to secure their data

Security Lock

Gemalto has just issued a report which clearly shows how lenient we are when it comes to protecting our private data on the Internet. In short, we are very quick to give companies our personal data, we want them to safeguard it, but we’re pretty certain they’re doing a terrible job at it.

Gemalto has polled 9,000 consumers in the following countries: Australia, Benelux, France, Germany, Russia, UAE, Saudi Arabia, India, Japan, United Kingdom, and United States. Almost three quarters (70 percent) claim organizations are responsible for securing customer data. Just 30 percent believe the responsibility lies with them.

Continue reading

Businesses not prepared for the risk from mobile and IoT apps

Internet of things

Despite widespread concern about the security of mobile and IoT applications, organizations are ill-prepared for the risks they pose, according to new research.

The study from threat prevention company Arxan Technologies, IBM Security  and the Ponemon Institute reveals that 60 percent of respondents believe it’s either certain or likely their organization has experienced a material data breach or cyber attack over the past 12 months that was caused by an insecure mobile app.

Continue reading

EFF sets out privacy and security plans for the first 100 days under President Trump

trump-100-days-eff

The Electronic Frontier Foundation has set out its plans for the first 100 days under Trump, during which time it says it will continue to fight for the rights of internet and technology users.

The digital rights group has already drawn up a wishlist for covering its privacy and security dreams for 2017, but the 100-day plan sees the EFF setting out its agenda for the first few months under Trump. Having claimed that "our civil liberties need an independent defense force" and that "free speech and the rights to privacy, transparency, and innovation won’t survive on their own", EFF is prepared to go to court -- again -- to hold the new administration to account when necessary.

Continue reading

UK health trusts hit by ransomware attacks

Healthcare

The UK's National Health Service is being targeted by ransomware according to a new study which shows that 30 percent of NHS Trusts have suffered an attack, potentially placing patient data and lives at risk.

The findings come from a Freedom of Information Act study conducted by endpoint security company SentinelOne. It submitted FOI requests to 129 NHS Trusts, of which 94 responded.

Continue reading

Even ransomware stops for Christmas

gift hacker criminal present

An 81 percent drop recorded in Locky ransomware infections in December is thought to be down to the cyber criminals behind the malware taking a Christmas break.

Threat prevention company Check Point recorded the big drop in Locky infections as part of an eight percent overall decrease in the number of recognized malware attacks on organizations in December.

Continue reading

The list of most common passwords of 2016 includes a few surprises

password-sticky-note

Security breaches and data leaks are, obviously, a major concern, but they do have something of a silver lining. Leaks of passwords may open up the risk of individual accounts being targeted, but they also serve as a fascinating insight into the level of security people use for online services.

We all know someone who insists on using 'password' as their password, or something equally insecure such as '123456'. Keeper Security has published a list of the most common passwords used in 2016, and these old favorites remain firmly placed in the top 10. But there are a few surprises along the way, such as the weird popularity of '18atcskd2w'.

Continue reading

FBI-helping phone-cracking firm Cellebrite hit by 900GB hack

green-light-hacker

Cellebrite -- the Israeli security company famed for helping the FBI crack the iPhone at center of the San Bernardino case -- has been hit by hackers. The attack resulted in the theft of 900GB of data.

While the website Motherboard -- which was handed a copy of the data -- reports that "the cache includes customer information, databases, and a vast amount of technical data regarding Cellebrite's products", the company has downplayed the incident.

Continue reading

How to protect yourself from the WhatsApp 'backdoor'

WhatsApp

Earlier today we reported about a security problem in WhatsApp that means it is possible for messages to be intercepted and read by others. The so-called 'backdoor' takes advantage of the fact that WhatsApp's implementation of end-to-end encryption makes it possible to resend encrypted messages using different security keys, allowing for third parties to read them.

What is concerning many people is the fact that (by default, at least) WhatsApp does not alert users when a message is resent using a different key -- which would be a warning of something going on. Here's what you need to do to ensure you are told when the key changes.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.