Articles about Security

Windows 10 Insider Preview Build 14352 includes Cortana, Ink and Feedback hub improvements

windows_10_bubble

Microsoft has pushed Windows 10 Insider Preview Build 14352 to the Fast Ring. The latest build introduced a number of updates and bug fixes. One of the biggest changes is to Cortana which can now be used to control a Groove Music Catalog and set a timer.

The recently-introduced Windows Ink gains improved Sticky Notes, and the ruler now benefits from the inclusion of a compass. Gamers can now enjoy the Windows Game bar at full-screen in more games, including World of Warcraft, Counterstrike: Global Offensive, and Diablo III. Important changes have also been made to the Feedback Hub.

Continue reading

Google plans to replace your Android password with a 'trust score'

Android unlock pattern draw lockscreen

Google wants to do away with traditional passwords on Android and replace them with "trust scores".

The company outlined how it is planning to make the transition away from passwords on its mobile platform by 2017 during its I/O conference last week. By using a variety of different metrics, Google’s Trust API technology would be able to replace traditional passwords and pins used to unlock its smartphones.

Continue reading

Decade-old 'forbidden attack' vulnerability affects HTTPS Visa sites

Security attack

A number of supposedly secure HTTPS sites owned by Visa are vulnerable to what has been dubbed the 'forbidden attack'. The security flaw makes it possible for hackers to inject content and code into sites, as well as opening up the possibility of performing man-in-the-middle attacks.

A team of researchers have published a paper that shows how 70,000 HTTPS servers were vulnerable to the attack, and 184 were found to be particularly at risk. While many of the affected sites have since been patched, sites belonging to Visa and Polish banking associate Zwizek Banków Polskich remain insecure because of reusing a cryptographic nonce in contravention of the TLS protocol (hence the 'forbidden' tag).

Continue reading

Nearly half of European workers use personal devices for work

business mobile employees team

Shadow IT, or stealth IT, is a practice still commonly used by European workers, according to a new Fuze report. It means employees are using either hardware or software that has not been directly approved of by the IT department, risking security breaches.

The report, entitled "App Generation report", argues that 40 percent of employees are using their personal devices for work. The same goes for software and apps.

Continue reading

Microsoft stops you from using weak passwords

hand stop

Having a good password can make the difference between your account being hacked and receiving a notification informing you of a failed login attempt. Even though this should be common knowledge, it seems that many folks are in the dark about this. You do not need to look hard to find evidence of this, as there are many reports that reveal passwords like "1234567890" to be very popular still.

Since it is clear that it cannot rely on its users to make the right decisions about their account security, Microsoft is taking a proactive approach by "dynamically banning commonly used passwords". So, if you think that "qwerty123" is good enough to keep all your emails private, luckily you will not have to find out whether you are right or not.

Continue reading

5 popular tactics scammers and hackers use to steal your identity

Identity theft

Though stealing someone’s identity is illegal, there are plenty of sneaky but legal tactics scammers and hackers employ that can expose you to identity theft as well. The first step in preventing this distressing scenario is being aware of the more common data collection schemes used to leave you vulnerable.

Here, we’ll detail five strategies you should be aware of so you can keep your identity -- and sanity -- in check.

Continue reading

Better online security or faster internet, which would you choose?

choose compass

Your answer probably depends on how old you are. According to a new survey 57 percent of Americans would take the better security. However, where millennials are concerned 54 percent would rather improve their internet speed.

This is among the findings of a new survey by adaptive access control company SecureAuth Corporation and Wakefield Research. Gender and education make a difference too, while men are split fairly evenly between personal online security (51 percent) and speed (49 percent) significantly more women care about online security (62 percent). When it comes to education, 63 percent of college graduates care about security, as against 47 percent of high school graduates.

Continue reading

Brazil a major cyber security risk ahead of Olympics

Brazil flag keyboard

There have been plenty of concerns in the news over Brazil's readiness to host this year's summer Olympics, ranging from the Zika virus and political unrest to poor ticket sales.

A new report from BitSight Technologies highlights cyber security concerns too with security performance of companies in Brazil among the worst in the developed nations, meaning business dealings in this region could come with serious risk.

Continue reading

Malwarebytes extends enterprise endpoint detection system to include Macs

Apple security

Although Macs have been relatively immune to malware, they have faced nuisance apps like adware and PUPs for years, and new threats are appearing, including ransomware like KeRanger. Experts believe it's only a matter of time before the next big attacks against Macs surface.

With more companies turning to Macs and a rising number of new threats, concern about the possibility of widespread Mac vulnerabilities is on the rise. Malware protection specialist Malwarebytes is responding to this by extending its Breach Remediation platform to cover Mac systems.

Continue reading

Mozilla welcomes privacy-boosting GDPR data protection law updates

mozilla

In a world more concerned than ever with privacy and data security, law makers are scrambling to keep up to date. With the growth of the internet, many old and inappropriate laws have been bent to fit a purpose they were not designed for. A case in point are European data protection directives which date back more than two decades.

In April this year a new law was adopted -- the General Data Protection Regulation, or GDPR. With compliance with the law required of the 28 EU member states by 25 May 2018, a two-year countdown is now underway. GDPR is welcomed by Mozilla who is using the 24-month compliance deadline to draw attention to some of the regulation's highlights.

Continue reading

Ransomwhat? 43 percent don't know what ransomware is

ransomware_keyboard_button_dollar

A new report shows that 43 percent of consumers in the US and Canada don't know what ransomware is. A similar number (44 percent) say they don’t know what data or information could be stolen in a ransomware attack.

The study by Kaspersky Lab surveyed 4,000 US and 1,000 Canadian consumers aged over 16 and found that only 16 percent mentioned ransomware as a cyber threat they were worried about, compared to their concerns about viruses, spyware and Trojans.

Continue reading

People want safer alternatives to passwords and they want them now

password_security_hole

As the recent leak of LinkedIn data shows, passwords are an increasingly vulnerable and flawed way of securing systems.

A new survey from identity management specialist Gigya reveals that consumers are beginning to recognize this and that 52 percent would choose anything but a traditional username and password account registration when given the option.

Continue reading

Apple re-hires security expert of PGP, Blackphone and Silent Circle fame

apple-padlock-key

Following the company's very public stand-off with the FBI over the San Bernardino shooter's iPhone, Apple is demonstrating that it has a great interest in security by re-hiring encryption expert Jon Callas.

Best known for founding security-focused firms PGP Corp and Silent Circle -- the company behind the ultra-secure, privacy-centric Blackphone -- Callas has worked for Apple on two previous occasions.

Continue reading

How much does a DDoS attack cost?

GitHub hit by biggest DDoS attack ever

Security researchers have discovered that DDoS attacks are now available to purchase on the Internet for as little as $5 an hour.

The researchers, who work for the security firm Imperva, were able to find distributed denial of service attacks (DDoS) for as low as $5 an hour on the online professional services marketplace Fiverr. A year ago these same services cost $38 an hour and could only be found on the dark web.

Continue reading

Brits are willing to compromise their online security to get fit for the beach

man beach summer

With the approach of summer, many people are looking for diet and fitness solutions to get themselves ready for the beach.

But research into the practices of 1,000 British internet users by Intel Security finds a willingness to compromise online security to achieve a dream body.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.