Articles about Security

Chrome embraces HTML5 and tells Flash ads to eff off

html5

The writing has been on the wall for Flash for some time now. A web technology loathed for countless reasons -- not least the security issues -- the death knell is now tolling loudly as HTML5 is more widely embraced.

Back in June, Google announced that Chrome would pause Flash ads in its browser by default, helping to eliminate a major online annoyance. Now the company has outlined when this will happen -- and there are only a few days to wait.

Continue reading

Kaspersky launches improved business security for Macs

Apple security

Macs have around six percent of the business endpoint market and Mac specific malware is on the increase. In the rapidly evolving world of malware and security, Mac users can no longer afford to be complacent when it comes to protecting their systems.

To tackle these threats Kaspersky Lab is updating its Kaspersky Endpoint Security for Business suite with Endpoint Security 10 for Mac. This offers a combination of deep protection, efficiency and manageability, designed to serve the needs of protecting diverse IT environments.

Continue reading

Browsers and privacy: Pay attention to what you search for

man laptop

Internet browsers are like sports teams. Every IT department and individual has an opinion on which one is the best, and personal preferences often comes down to long standing allegiances.

In the browser’s case, this is due to personal preference or ease of IT administration. Search privacy is not always top of the agenda, but should it be?

Continue reading

TeleSign and Telefόnica team up to cut mobile fraud

Phone security

Mobile identity specialist TeleSign has announced an agreement with Spanish telecoms giant Telefόnica -- the company behind O2 in the UK and Germany -- to deliver a suite of services to address account security and fraud prevention for enterprises and service providers.

The partnership will use TeleSign's products and infrastructure, along with Telefόnica's consent-based insights, to increase account security, reduce fraud, and improve customer experience for consumers. At the same time it will help to manage costs for service providers across financial services, e-commerce, cloud and social media.

Continue reading

Critical PayPal XSS vulnerability left accounts open to attack

insecure_paypal

PayPal has patched a security vulnerability which could have been used by hackers to steal users' login details, as well as to access unencrypted credit card information. A cross site scripting bug was discovered by Egyptian 'vulnerabilities hunter' Ebrahim Hegazy -- ironically on PayPal's Secure Payments subdomain.

Hegazy found the Stored XSS Vulnerability on https://Securepayments.Paypal.com back in the middle of June, and was able to demonstrate how it could be exploited. More than two months later, PayPal has addressed the issue and plugged the security hole.

Continue reading

Easiest malware removal trick -- ever

EasiestWay200-175

Removing malware is often a complex and time-consuming task, even for security experts. But as Bitdefender has reported, sometimes, just occasionally, the most effective technique can be extremely simple.

Like, turn your PC off, and on again.

Continue reading

84 percent of people support eliminating passwords

Password tweezers

Spare a moment to consider the plight of the humble password. It has become an essential component of modern life, but it would be wrong to say we've grown to know and love it.

In fact a survey by mobile authentication specialist LaunchKey shows that 84 percent of respondents would like to do away with passwords altogether and 76 percent believe their information would be more secure with an alternative form of authentication.

Continue reading

Security education saves companies millions of dollars a year

phishing

Successful phishing attacks can lead to costs from loss of employee productivity and credential compromise, among other factors, which together may cost an average sized company $3.77 million per year.

New research released by Wombat Security Technologies and the Ponemon Institute finds that the phishing email click rate improved an average of 64 percent following security training.

Continue reading

One percent of employees account for 75 percent of cloud risk

Cloud risk

Cloud security specialist CloudLock has released a new report looking at the risks of user behavior to businesses using cloud systems.

It reaches the startling conclusion that just one percent of users account for 75 percent of the security risk. The top one percent of users are responsible for 57 percent of file ownership, 81 percent of files shared, 73 percent of excessively exposed files and 62 percent of app installations.

Continue reading

AT&T accused of injecting ads through its free Wi-Fi hotspots

att_logo

What price is free? In the case of Windows 10, many argue that it means giving up a little of your privacy, and it seems that AT&T's free Wi-Fi hotspots also come with a hidden payload. Whilst visiting Dulles Airport, computer scientist Jonathan Mayer noticed that "the web had sprouted ads. Lots of them, in places they didn’t belong".

With time to kill waiting for a flight, Mayer set about investigating where these extra ads were coming from. It didn’t take long for him to discover that the AT&T hotspot he was connected to was the problem. He found that the hotspot was injecting a stylesheet which in turn pulled in advertising. But it didn’t end there...

Continue reading

Millennials lose trust in the digital economy

Broken trust

Although millennials are the first fully connected generation, having lived their whole lives in the Internet era, new research suggests that they're beginning to recognize that their identity and personal data may not be properly protected.

Digital identity specialist Intercede surveyed around 2,000 16-35 year-olds in the US and UK to get their views on current security measures. The results suggest what the company calls a 'millennial malaise' towards existing safeguards, in particular the use of easily-hackable but widely used password-based authentication methods.

Continue reading

Samsung smart fridge might leak your Gmail credentials

Gmail app running on Google Nexus 5

Your smart fridge might be good for storing cold beer, but it definitely isn’t good for storing your Gmail credentials, as those can be easily stolen. During the recent DEF CON hacking conference, the vulnerability was unveiled at the IoT hacking challenge run by Samsung.

The fridge that got owned was the RF28HMELBSR smart fridge. It downloads Gmail Calendar information and displays it on an on-screen display. The device does implement SSL, but it fails to validate SSL certificates, thereby enabling man-in-the-middle attacks against most connections.

Continue reading

NSA wants to future-proof encryption standards against quantum computers

nsa_gchq

The NSA is concerned that current methods of cryptography, used to encrypt data and ensure that if it does fall into the wrong hands it’s not readable or usable, are going to be woefully inadequate and easily broken when quantum computers come into play.

Of course, this isn’t going to be something that happens in the near future, as quantum computers -- which instead of bits, use qubits that can hold three states instead of the usual binary 0 or 1 -- are still merely conceptual in nature, and won’t be fully realized for many decades yet.

Continue reading

Most Android lock patterns are easy to guess

Android Unlock Pattern

Your Android lock screen patterns are so predictable, it almost makes no difference if you use one or not.

According to a study by a woman named Marte Løge, a graduate of Norwegian University of Science and Technology, a vast majority of Android users use lock patterns which are easy to guess.

Continue reading

Travel tips for mobile employees

man beach summer

Long days, warm weather, the lure of travel, if only to a nearby park or beach -- many employees, naturally, are thinking of escaping the office for time away.

For the past year, since the passage of home working legislation in the UK, employees who have been on the job at least 26 weeks have had the right to request flexible working hours.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.