Just 21 percent of Internet users feel threatened by anything online, including malware, viruses, fraud, etc. At the same time, 29 percent have actually fallen victim to cybercriminal schemes, out of whom eight percent have had an account hijacked, and 22 percent have had malware on their devices.
On top of it all, a total of 60 percent of all people online use protection, in form of a cybersecurity solution for all devices accessing the internet. These figures were unveiled by Kaspersky Lab which has, together with B2B International, released a report on the current level of cyberthreats faced by internet users, called Kaspersky Cybersecurity Index 21 – 29 – 60.
With many cyber attacks now initiated through the browser, endpoint security is something all businesses need to take seriously.
Among today's announcements at Ignite, Microsoft trailed security enhancements across a range of its products, including the Edge browser. Windows Defender Application Guard will be available to Windows 10 Enterprise users from next year and aims to make Edge the most secure business browser.
A group of hackers speaking Russian and using Russian servers are out hunting for American companies' user credentials, an exclusive story published on The Epoch Times claims.
This group, allegedly not tied to any government and basically operating on its own, is targeting "at least" 85 companies, including Amazon, American Airlines, AT&T, Best Buy, Wells Fargo, DropBox, Dunking Donuts, Ebay, GoDaddy, Uber, Match.com, McDonald’s, Office Depot, PayPal, Pizza Hut, Steam, and Apple Pay.
According to security researcher Daniel Cid, at least 15,769 WordPress websites have been compromised this year by cyber-attackers who were able to evade Google's Safe Browsing checks.
WordPress is the most popular content management system in the world, used by consumers and businesses to create and publish blogs. To conduct the research needed for the second 2016 Sucuri report on compromised web properties, 21,821 sites were studied with the majority of them using WordPress to manage and publish their content. The report also found that 3099 Joomla! sites were hacked during that time as well.
Next month I return from my first—and hopefully last—summer sabbatical. I resume writing with a question for you: "When is stupidity fraud?" I ask because someone is using my gmail address to sign up for a humungous number of newsletters and websites. At first, I presumed someone trolled me. But that no longer appears to be the case. This guy, presumably living in North Carolina, either uses my address randomly to hide his identity, or he mistypes one that is similar. Given many of the services are for an unidentified widower looking for love, I assume the latter.
Behind my question are real concerns about identity and privacy that do not just apply to me. The email address gives me the ability to change the passwords and even cancel accounts—both of which I have done, treating his misuse of my email address as identity theft and violations of my privacy; after years of careful cultivation that reduced spam, crap is on the rise as this misuse spreads my gmail identity across dating and discount sites and sex webcams. Who knows on what mailing lists it will appear next.
There have been numerous cases of iCloud accounts being hacked over the years, but it's the celebrity ones that hit the headlines. Well, that and things like the Fappening. The latest celebrity account to fall victim to hackers is Pippa Middleton, sister of British royal Kate Middleton, the Duchess of Cambridge.
A reported 3,000 images have been stolen from Pippa's account, and these are said to include photographs of Kate and her children. Leaked images also show photos from private parties, and shots of wedding dresses.
For many people, both business owners and employees, remote working is the future of business. It’s at the very heart of business transformation, together with cloud computing, automation and artificial intelligence. However, a new poll by OneLogin seems to suggest that certain workers aren’t really fond of the idea of remote working.
Half of full-time workers believe employees below mid-manager level shouldn’t be allowed remote access to the corporate network. This remote access refers to both work-owned devices (47 percent) and private devices (54 percent).
On a daily basis, the news is filled with stories about things that "should never have happened". Last weekend’s headline, "Improvised Explosive Device Explodes in New York City’s Chelsea Neighborhood", is one tragic example. No one could have anticipated the attack, but through the use of cameras placed throughout the area, law enforcement was able to identify a suspect and track his movements within hours.
In the real world, no one can know every single threat that could exist in the future, or when it might happen. You can make educated guesses with the right intelligence and data, but you can’t predict with certainty. This is why New York, London, and other metropolitan areas have installed surveillance cameras. They’ve done this so that if a situation does unfold, they can quickly triage and provide authorities with immediate and accurate information to inform response and investigation.
Data breaches have become the norm in recent years with 2014 earning the nickname the "year of the data breach" and 2015 being known as the "year of the breach". So far in 2016, even more data breaches have been made public, including LinkedIn, MySpace and Dropbox and we will likely see more before the year comes to a close.
For companies, being the victim of a breach is unnerving enough, but there also implications to their reputation, brand and finances. However, breaches also have an indirect impact on organizations and some end up facing the "collateral damage" of such an attack for some time after the initial breach.
Healthcare, Telecommunications, Retail and Transportation: How do they stack up on security awareness?
Breaches and attacks have run rampant through most major industries, and organizations are beginning to realize the importance of employee and stakeholder security awareness. Healthcare and retail have been in the brightest spotlights with the rise in ransomware and credit card data breaches in the last couple of years, but they are not the only ones facing this challenge. Wombat Security's Beyond the Phish report found that telecommunications and transportation industries also struggle with a wide range of security issues.
Ultimately, an organization can improve its defenses by elevating the level of security best practices across its employees and addressing the biggest offending categories of awareness.
Data protection has historically been viewed as a function owned by a few individuals, or the domain of the IT department. However, it is vital that all employees share the responsibility of preventing and mitigating information security breaches.
When an organization creates a corporate culture dedicated to data protection, it provides more disciplined operations, increased customer and stakeholder trust, and minimized risk.
Yahoo users who have not changed their passwords for a while are being advised to do so. The company has confirmed that it suffered a major security breach back in 2014 and information relating to 500 million accounts was stolen.
Yahoo says that the attack was carried out by a "state-sponsored actor" but does not elaborate on who it might be. The data accessed includes "names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers".
Attacks on websites are a daily occurrence so to get any real attention an attack needs to be something special. Starting on Tuesday, Brian Krebs' security blog, KrebsOnSecurity.com, was hit with what is being described as "the largest DDoS the internet has ever seen".
Despite being clobbered with a colossal 665 Gbps of traffic, Krebs' site remained online thanks to the anti-DDoS efforts of security firm Akamai. It is thought that Krebs was targeted for his exposés of hackers, and the attack was delivered via a huge number of hacked IoT devices.
A new study reveals that 53 percent of IT professionals use common, but ineffective, methods to erase data on corporate computers, external drives and servers.
The survey by Blancco Technology Group of over 400 professionals worldwide found that 31 percent report dragging individual files to the Recycle Bin and 22 percent reformat the entire drive.
A majority of enterprises (79 percent) say they have taken action to improve their security in response to major cyber attacks. However, 40 percent of organizations still store privileged and admin passwords in a Word document or spreadsheet, while 28 percent use a shared server or USB stick.
This is among the findings of the 10th annual Global Advanced Threat Landscape Survey from cyber security company CyberArk which looks at whether organizations are learning lessons from cyber attacks.