Articles about Security

GCHQ plans Great British Firewall to protect web users

Union flag keyboard

The UK's cyber intelligence agency GCHQ is planning what has been labelled a 'Great British Firewall' to protect individuals and companies against cyber attacks.

The idea emerged in a speech delivered by the head of GCHQ's national cybersecurity centre, Ciaran Martin, at the Billington Cyber Security Summit in Washington DC.

Continue reading

American Express customers phished using phishing prevention scam


In a rather ironic twist on traditional phishing attacks, customers of American Express are being targeted by a campaign promising them an identity theft and phishing prevention tool.

The phishing emails offer SafeKey use as bait. This is a legitimate program that Amex offers its customers as an additional layer of security to guard against ID theft and phishing.

Continue reading

One in five companies fail to test for security vulnerabilities

Software analyst testing

Many businesses don't carry out frequent security testing despite believing that it's critically important to securing their systems and data, according to a new survey.

The study from managed security services company Trustwave and Osterman Research finds that one in five businesses surveyed don't do any security testing, despite the fact that 95 percent of respondents reported encountering common security issues associated with security vulnerabilities.

Continue reading

New partnership aims to improve threat detection

Hidden threat

The problem with many security solutions is that the number of alerts they generate leads to a good deal of time in investigations, some of which will turn out to be false positives.

Real-time analytics company Corvil is partnering with endpoint security specialist Carbon Black to offer customers unified cyber threat detection, analysis, and response.

Continue reading

Employees sue Seagate over HR department's private data leak


After falling victim to a phishing scam in March, Seagate is now being sued by its own employees whose sensitive data was exposed in the leak.

The company's HR department was tricked into providing the operators of the phishing scheme with the personally identifiable information (PII) of 10,000 past and current employees and W-2 forms that include their Social Security numbers along with their wage, salary and tax information.

Continue reading

Dispelling 5 common myths about desktop printers in the office

Office printer woman

They may seem like technology from the days of old, but make no mistake -- desktop printers still can hold an important place in British businesses today. Not only do they help create efficient and flexible printing management, but they also can help keep British office workers at their most productive, rendering them potentially one of the most important products for IT managers in 2016.

The value of desktop printers is often overlooked due to advancements of new printer technology services, including an array of enterprise-orientated features, however, the traditional role of the printer mustn’t be forgotten. Desktop printers intertwined within a multi-device print and document management strategy, whilst also combining bigger multi-function devices with smaller devices, should arguably become commonplace for all managers responsible for their company’s printing activities.

Continue reading

The growing security risks in enterprise Windows environments [Q&A]

why question mark

ManageEngine recently announced the results of its global Active Directory and Windows Server Security -- Trends and Practices Survey for 2016, which found that 70 percent of IT administrators across the globe agree that their Windows environments are not immune to malicious attacks.

To delve a bit deeper, we spoke to Derek Melber, a technical evangelist for ManageEngine.

Continue reading

Fifteen years after 9-11, threats have evolved too


Fifteen years after 9-11 it’s interesting to reflect on how much our lives have -- and haven’t -- changed as a result of that attack. One very obvious change for all of us since 9-11 is how much more connected we are to the world and to each other than we were back then. Politico has a great post quoting many of the people flying on Air Force One that day with President George W. Bush as his administration reacted to the unfolding events. Reading the story one thing that struck me was the lack of immediate information about the attacks available to the airborne White House. They had televisions with rabbit ear antennas and rarely more than a few minutes of TV coverage to watch at a time as they blasted around the midwest at mach 0.94.

Even Mary Alyce and I, sitting on our Wine Country hillside, were watching satellite TV that day. Today, of course, we all have news and social media coming-in through a wide variety of channels and nothing is very private for long.

Continue reading

New version of RAA ransomware only goes after business users


A new version of the RAA ransomware was found recently by security researchers at Kaspersky Lab. This one, written completely in Jscript, seems to be targeting business users exclusively, the researchers claim.

It comes as they all do: through an email with the malicious attachment. This one, however, comes in a password-protected zip file. This method does two things:

Continue reading

Intel Security will revert to the McAfee name

Intel Security McAfee

Intel has made the decision to sell off a majority stake in its security software arm, which was previously known as McAfee, to the private equity firm TPG.

In 2010, the chip maker acquired the security software company for $7.6 billion and then four years later it decided to do away with the McAfee name entirely in favor of Intel Security. TPG, which will own 51 percent of the company after the sale, will be reverting the company name back to McAfee, likely due to the security software being a household name and having a large user base.

Continue reading

Niche software vulnerabilities leave enterprises open to attack

Security attack

News of software vulnerabilities often centers on products from well-known companies that potentially put large numbers of end users at risk.

But a new report from software solutions company Flexera Software reveals that the niche products used by specialist industries can be just as much of a problem.

Continue reading

Protecting your wireless security camera footage


About four years ago, before I had children, I was quite surprised when friends of mine had a baby monitor with a video display -- not because I didn't think something like that was possible, but the fact that it was normal and available in a nice wireless package was striking for someone inexperienced in the baby world.

Several years later, my wife now checks on our younger child every night with one. The sense of security and convenience that come with a device to instantly check on someone or something that you care about can be extremely valuable.

Continue reading

Chrome to warn users of insecure HTTP sites that transmit passwords or credit card info


With Chrome, Google is on a mission. A mission to make the internet a safer place. Its ultimate goal is to display a warning that HTTP sites (rather than HTTPS) are insecure, but this is a long-term plan and there are many stages to go.

Starting at the beginning of next year in Chrome 56, the plan moves to its next stage. As of January 2017, any HTTP sites that transmit passwords or credit card details will be flagged up as being insecure.

Continue reading

New cloud suite aims to eliminate passwords

cloud security

Passwords are old technology and were never really designed to protect public access to sensitive information like bank and healthcare details. Yet despite the introduction of new technologies like two-factor authentication, biometric recognition and others, the password continues to cling on.

Identity and authentication platform Trusona wants to hasten the death of the password with the introduction of its Cloud Identity Suite, offering three tiers of identity-proofing and authentication, and making the basic level available for free.

Continue reading

More than half of malware infected files in cloud apps are shared with others


The latest report on enterprise cloud usage and trends from cloud security specialist Netskope reveals that 55.9 percent of malware-infected files found in cloud apps are shared publicly.

It also finds that ransomware is now one of the most common threats, with 43.7 percent of malware infections found in enterprise cloud apps having delivered ransomware. These include Javascript exploits and droppers, Microsoft Office macros and PDF exploits.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.