Articles about Security

DDoS attacks and how they work

DDoS attack start

DDoS attacks are one of the greatest threats that companies face and can lead to financial losses and damage to customer relationships.

But how exactly do these attacks work? Cloud delivery security company Incapsula has put together an infographic explaining the anatomy of an attack.

Continue reading

Privacy ombudsman could handle European complaints about US surveillance


The importance and awareness of online privacy issues have been brought into sharp focus in the 21st century. It's not entirely down to Edward Snowden, but the revelations from the former NSA contractor are a constant reference point for those concerned with privacy, security and freedom of speech.

One of the greatest problems facing anyone trying to tackle the problem of privacy on the web is dealing with the ideologies of different countries, and how this affects data sharing. A level of surveillance that is deemed acceptable in the US, for instance, may be considered completely objectionable in another. The latest suggestion to help overcome this seemingly insurmountable problem is to set up a privacy ombudsman that would be able to handle European complaints and queries about US surveillance.

Continue reading

AppRiver reveals the malware and spam trends in 2015


American email and web security firm AppRiver has released its end-of-the-year report, where it showcased a detailed analysis of malware and spam trends in 2015.

The report, entitled Global Security Report, says that the number of email messages containing malware doubled, year-on-year. From January to November, AppRiver quarantined 944 million messages, and in December alone, another 705 million.

Continue reading

PC users, get rid of Adobe Flash end of life versions

Finger Pointing

Secunia Research at Flexera Software has published a report covering the fourth quarter of 2015 for 14 countries, regarding vulnerable software, applications and PCs.

Turns out we’re not really good at keeping our computers safe, and our software up to date.

Continue reading

Humans get frozen out of frontline security

robot security shield

A new report from application delivery and cyber security specialist Radware suggests that the human element will increasingly be excluded from security as 2016 brings a 'battle of the bots'.

It finds that throughout 2015, no industry was immune to cyber attacks, and few were prepared for them. In 2016, attacks are predicted to become even more aggressive with the arrival of Advanced Persistent Denial of Service (APDoS) attacks and an increase in volume and scope of sophisticated bot-generated assaults against web application infrastructure.

Continue reading

Majority of consumers expect their data to be compromised in 2016


The series of high-profile data breaches we witnessed last year has left a mark on the way consumers perceive online business, a new research from NCC Group and IDG Research Services shows.

According to the research, entitled Trust in the Internet 2016, 63 percent of consumers expect their data to be compromised this year, and 60 percent are now worried, more than ever, about protecting their data on the Internet.

Continue reading

Only 45 percent of organizations are confident in their security

Enterprise security

According to a new report 92 percent of executives believe regulators and investors will expect companies to manage their cyber security risk exposure, yet only 45 percent are confident in their security posture.

This is among the findings of the Cisco 2016 Annual Security Report which looks at the challenges businesses have in the face of a growing number of cyber threats.

Continue reading

Businesses believe compliance is effective at stopping data breaches

Stop street line road

Companies are approaching the data safety issue the wrong way, according to Vormetric's 2016 Data Threat Report, which was issued in conjunction with analyst firm 451 Research. The two companies polled 1,100 senior IT security executives from large businesses worldwide.

Key findings suggest that the rate of breaches is up, with 61 percent experiencing one in the past. From that number, 22 percent happened in 2015, and 39 percent in the year prior.

Continue reading

Angler exploit kit celebates the new year by adding CryptoWall 4.0


We're only a couple of weeks into a brand new year, and the outlook for security isn't looking particularly better. That doesn't mean you'll be hacked or malware will run wild on your computer, but it does mean you'll still need to be vigilant.

Now the popular Angler exploit kit has a brand new threat contained within it and this one could be especially scary. CryptoWall aims to lock up your files and hold them for ransom, an attack method that has been around now for sometime.

Continue reading

Don't open that Facebook email attachment -- it could be malware

Facebook target

Two weeks ago, the Comodo Threat Research Lab discovered a malware campaign aimed at businesses and consumers using the WhatsApp mobile messaging service. That attack used official looking emails masquerading as WhatsApp content.

Now Comodo’s researchers have identified a similar phishing campaign targeting Facebook users, which it believes was created by the same group behind the WhatsApp malware.

Continue reading

Tim Berners-Lee is an idiot for wanting to expose cyberbullies' identities


While there is greater interest than ever before in online privacy there are also calls from some quarters for people who use the web to be fully accountable. This is part of the thinking behind Facebook's real names policy, and it's also what's driven Tim Berners-Lee -- no less than the inventor of the web -- to call for the identities of cyberbullies to be exposed.

In the wake of gamergate and countless other examples of women being abused online for little more than being women, bullying of school children by their contemporaries, and endless racist, sexist, and politically motivated attacks online, the suggestion might seem -- on the face of it -- to make sense. But it fails to stand up to scrutiny and is likely -- ultimately, if anyone were insane enough to follow his advice -- to be completely counterproductive.

Continue reading

Businesses need to place higher priority on cyber security


Only 45 percent of worldwide organizations are confident in their ability to fend off today’s sophisticated cyber attacks. This is one of the key findings from Cisco’s 2016 Annual Security Report, which was released today.

With the rate of digital transformation continuing to increase, business leaders are increasing measures to secure their organizations’ future, with 92 percent agreeing that regulators and investors will expect them to manage cyber security risk.

Continue reading

Google wants to drive ISIS from the open internet to the dark web


You can say what you like about ISIS, but it certainly knows how to do propaganda. In fact, the group can pretty much sit back with its feet up -- when it's not busy, you know, killing people in increasingly horrific ways -- as web users the world over are only too happy to do the legwork and spread the shocking imagery on its behalf. But Google has had enough and wants to drive ISIS from the web to the dark web.

While many would question the value of pushing the terrorist group further underground and encouraged to use ever-more secretive tools, Google believes ISIS propaganda doesn't belong on the open web, but should only be accessible through the like of Tor. Jared Cohen, director of Google Ideas believes it makes sense to drive Islamic State to the dark web to try to blunt its propaganda.

Continue reading

Earbits music service had a data breach, but there should be no need for concern

Data breach wall writing man

Earbits, which came close to shutting down before being backed by You 42, is a popular platform for finding new artists. It's available, not only on the web, but also for Android, iOS and Chrome. The service was founded in 2010 by Joey Flores with the goal of promoting the artists and doing so without ads or premium plans.

The problem with any online service is security and there are many examples of those who got that part wrong. Often times these sites were poorly protected and user data has been stolen -- names, emails, even credit card numbers.

Continue reading

Managed service providers succeed by offering security products

Boardroom security

A new survey from IT management specialist Kaseya reveals a continued surge in overall growth for managed service providers (MSPs), especially for those offering security services.

Kaseya's Global Pricing Survey gathers data from more than 400 MSPs across 30 countries and offers unique visibility into the IT services they offer their clients. It finds that the majority of MSPs have experienced more than 20 percent growth over the past three years.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.