Articles about Security

New venture aims to completely rethink enterprise security

business-security

Up to now cyber security has generally taken a defensive approach to protecting data and intellectual property.

That’s set to change as a team of industry experts has got together to create a system that's aimed at dramatically improving the reliability and security of enterprise data and applications running in both cloud and conventional environments.

Continue reading

Microsoft unveils Office 365 Video for secure enterprise video sharing and streaming

Microsoft unveils Office 365 Video for secure enterprise video sharing and streaming

Microsoft is giving Office 365 users an early glimpse of what it hopes will become the future of enterprise video sharing. Office 365 Video harnesses the power of SharePoint and Azure Media Services to create a tool that gives businesses a one-stop-shop for uploading, sharing, delivering and streaming videos.

A number of possible scenarios are set out by Mark Kashman, a senior product manager in the Office 365 group. From providing employees with access to training videos to delivering CEO messages, this is a flexible tool that has been designed with security and simplicity in mind. Office 365 Video is not expected to launch until early next year, but a sneak peak is available right now.

Continue reading

DGA malware evolves to get past security solutions

Malware spy

Malware developers are constantly shifting the goal posts in order to evade detection mechanisms. Part of this involves changing the domain names used to communicate with command and control servers and spread infections.

The latest trick identified by security company Seculert is the increasing use of Domain Generating Algorithms (DGAs).

Continue reading

DDoS attacks fall as defenses improve

DDoS attack

New research from DDoS protection specialist Black Lotus shows that cyber attack incidents have continued to decline throughout this year.

There were 201,721 incidents in the third quarter of this year (down from 462,621 in Q1 2014 and 276,447 in Q2). This can be attributed to the security industry's increased knowledge and filtering against NTP DrDoS types of attacks, as well as more proactive activity to stop malicious attacks before or as soon as they're detected.

Continue reading

One third of retail security breaches come from third-party vulnerabilities

cloud commerce shopping

The past year has seen a number of high profile security breaches involving retail businesses and there’s no sign of the trend slowing down.

Security ratings company BitSight Technologies has released some new research looking at the performance of 300 major US retailers over the past 12 months. It shows that 75 percent of retailers that suffered a data breach have improved their security effectiveness.

Continue reading

87 percent of the top 100 paid iOS apps available as hacked versions

mobile security

According to the third annual State of Mobile App Security report from application protection company Arxan Technologies, 87 percent of the top 100 paid iOS apps have been hacked.

Don’t feel smug if you're an Android user though as the report reveals 97 percent of the top 100 paid Android apps have been too. But whilst the Android figure is in line with previous years, the iOS percentage represents a jump from 2013 when 56 percent were found to have been hacked.

Continue reading

Is cyber insurance your last line of defense?

cyber insurance

The recent spate of payment card breaches that have plagued the retail industry this year has prompted many merchants to consider investing in cybersecurity liability insurance policies to offset the costs associated with a breach recovery. These companies often make this choice based on the belief that the money they’ve spent to comply with industry security standards has failed to prevent these breaches from occurring, and there seems to be no other alternative. At least one recently filed claim has led to a lawsuit that will put these cybersecurity insurance policies to the test.

The key element of such lawsuits is determining liability -- who is at fault -- to determine whether the claims are justified and if the insurance companies will pay out. Finding a party liable for something means determining if the party was taking reasonable steps to prevent such actions from happening.

Continue reading

Mastercard and Visa working on new online payment verification system

credit-card-fraud-pin-chip-bank-mastercard-visa-800x450.jpeg

Credit card giants Visa and Mastercard are planning to get rid of their current online security verification system, and replace it with something a bit more modern and secure.

You’re probably familiar with either Verified by Visa or MasterCard SecureCode, which pop up when you make an online purchase, just before the payment is officially put through. They ask you to input letters from an extra password to verify that it’s actually the card owner making the purchase -- but in contemporary terms, this is a relatively unsophisticated security measure.

Continue reading

State Department email system shut down after hacker attack

State Department email system shut down after hacker attack

Reports from Associated Press reveal that the State Department has closed down its email system following a security attack. The news comes after the details of a hack attack on the White House in October were made public. It seems that the State Department's unclassified email system was attacked at the same time, and technicians are currently working to repair the damage.

It was suggested that last month's White House hack was linked to Russia, but it is not yet clear whether the attack on the email system is part of the same security breach. The email closure is described as "unprecedented", but officials insist that classified data systems have not been affected.

Continue reading

WatchDox finds and protects sensitive documents anywhere

Security Lock

With more and more data stored in the cloud or accessed from corporate systems on mobile devices, security and regulation becomes a major concern.

Enterprise file sharing specialist WatchDox has announced a new solution to both detect and protect sensitive files everywhere, on every device.

Continue reading

Facebook proposes privacy policy changes in simplified, prettified paperwork

Facebook proposes privacy policy changes in simplified, prettified paperwork

Facebook gets something of a bad rap when it comes to its privacy policy. Delve into the social network's terms and you're almost certain to find something you disagree with. This is the same with many companies, particularly those with an online presence, but users seem to be continually surprised to discover how their data and activities are being used and tracked. Part of the problem is that -- just like with software EULAs -- very few users bother to read through policies in full.

Mark Zuckerberg's social network is looking to change that. Facebook is introducing Privacy Basics which provides easy-to-follow guides to controlling how your online content is shared with others. But there are also a number of changes proposed to its privacy policy. Facebook is looking for feedback, and assures users that "you’re in charge." But you'll need to be quick -- there's only a week to give your opinion.

Continue reading

Beware the rise of the digital doppleganger

ID theft

Data breaches in large organizations have made the headlines in recent years and that’s led to a huge increase in the amount of personally identifiable information being traded online.

According to UK credit report company CreditExpert there's been a 300 percent jump in the amount of personal information being traded online since 2012.

Continue reading

It's your data: how to protect it now

data loss

It seems as if every week there’s another breaking story about an exploited network vulnerability that resulted in a security breach. The penetrations vary: Some are wide-scale orchestrated attacks, a la the Home Depot hack. Some hack events are less sensational, accompanied merely by the announcement that vast amounts of personal information were exposed -- or compromised -- because trusted technology providers offered lax security measures.

In some cases, we learn that passwords to accounts (that often hold vital personal information) have been leaking for some time before the security flaw was discovered and patched.

Continue reading

Gain your customers' trust with ethical data use

cyber security

Nick Bromley, a privacy consultant for the Greater London Authority, spoke at the NextGen 2014 conference about the importance of being an ethical company when it comes to gathering data on your customers, and how to retain their trust when it comes to data.

Here is what he had to say on the subject.

Continue reading

The true cost of DDoS attacks on business

DDoS attack

DDoS attacks can be extremely disruptive to business but it can be hard to quantify that disruption in financial and business terms.

A new report by security company Incapsula collates responses from 270 North American organizations of varying sizes to gauge the true impact of attacks. The findings indicate that DDoS attacks are relatively common with 45 percent of the respondents indicating their organization has been hit at some point. Of these, almost all (91 percent) reported an attack during the last 12 months, and 70 percent were targeted two or more times.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.