Articles about Security

How to set up a passcode on iOS and Android


There was a time when phones only contained text messages and contacts that the value of your device had been more important than what it stores. But that period is now long gone. In today’s age of smartphones, information has become more valuable than the device itself, which is why having a PIN on your smartphone has become more important than ever.

Tons of information -- such as your social media accounts, email messages and bank details -- can be accessed from your phone and we all know that security is not something to be ignored in this day and age. Setting up a passcode is an easy task on both Android and iOS smartphones and here’s how it’s done.

Continue reading

Yahoo might use your ear to unlock your phone

Yahoo might use your ear to unlock your phone

Smartphone security takes a number of forms; you might access your phone with a PIN, your fingerprint, or via facial recognition. But if Yahoo's plans gather momentum, you could be using your ear to unlock your phone in the not-too-distant future. The idea builds on the idea of the unique fingerprint we all have, taking advantage of the capacitive touchscreens that are now a standard feature of phones.

There's no need for special sensors as the way different parts of your ears touch the screen when held in the 'talk' position can be used to uniquely identify you. It's all part of Yahoo's Bodyprint program, which is also looking at how the way you hold your phone could be used as an unlock tool.

Continue reading

Kaspersky launches new security solution for small businesses


Security issues affect smaller businesses just as much as big ones, but they're often less equipped to deal with them due to limited resources.

Today Kaspersky Lab is releasing the latest version of its Kaspersky Small Office Security, built specifically for businesses with fewer than 25 employees. It's aimed at providing world-class protection and easy use without the need for specialized IT skills.

Continue reading

This is how the enterprise can keep up with hackers


The days of blissful ignorance are over. With consumers increasingly aware of the security and protection issues relating to their data, companies have been forced to become more transparent. Already the majority of states in the US have passed legislation requiring companies to notify customers when data breaches occur and efforts are also underway to strengthen similar laws across the EU.

Notifying consumers of data breaches is an important consideration in retaining trust but there is an equally important point to bear in mind. Sharing the related breach data to improve endpoint security will be crucial in giving businesses the best chance of repelling future threats. It will also help to limit the reputational and financial damage that such attacks can cause. After all, it is the application, not the notification that will help the enterprise gain the upper hand.

Continue reading

The Sun newspaper launches anonymous Tor-based WikiLeaks-style SecureDrop

The Sun newspaper launches anonymous Tor-based WikiLeaks-style SecureDrop

The likes of Julian Assange's WikiLeaks have set the standard for blowing the lid on huge stories based on tips from anonymous sources. Whistle-blowers such as Edward Snowden have brought to public attention stories which would otherwise have been kept hidden from the public, and it has been with the help of newspapers such as the Guardian that this information has been disseminated around the world.

Other newspapers are keen to ride on the coattails of those blazing a trail in the world of investigative journalism, and the latest to join the party is The Sun. Today, Murdoch-owned News Corp's newspaper and website launches SecureDrop -- a way for whistle-blowers to anonymously leave tip-offs that can be further investigated.

Continue reading

AVG introduces Crumble for Chrome, claims you can surf without surveillance


In today's world privacy has become a premium and companies and governments are the ones in the hotseat thanks to Edward Snowden, WikiLeaks and others. People are searching out ways to avoid being tracked, a difficult task in this current society. AVG is the latest to offer a solution.

The security firm is announcing Crumble, a new extension for Chrome that promises you can "surf without surveillance". The app comes from the Innovation Labs and is still in beta at the moment, but users can start testing it out now.

Continue reading

The Apple Watch becomes an enterprise security tool

Usher AW

Everyone, it seems, is jumping on the Apple watch bandwagon today with new apps, but one of the more interesting developments comes from enterprise security specialist MicroStrategy.

It's launched a version of its Usher platform allowing the Apple Watch to be used as a secure digital key, enabling wearers to log into business systems, unlock devices, validate personal identity, and open physical doors with a simple gesture or tap.

Continue reading

Samsung Galaxy S5 could be leaking your fingerprints


I’m usually not the paranoid one in a relationship, but the fingerprint scanner on smartphones always used to freak me out.

And now, a pair of researchers from security firm FireEye breathes new life into my paranoia, as they claim hackers can steal your fingerprint data before it gets encrypted in the device. One of the potentially dangerous devices, ‘leaking’ fingerprints is the Samsung Galaxy S5.

Continue reading

Conficker remains top of the threats as existing malware for Windows dominates

Hidden threat

Though we're constantly being warned about the threat offered by new malware it seems that, for Windows systems at least, the old favorites continue to catch us out.

The latest threat report from security company F-Secure shows that Conficker continues to be the number one Windows threat, kept alive by the number of unpatched legacy systems still around.

Continue reading

Groupon refuses to pay security expert who found serious XSS site bugs

Groupon refuses to pay security expert who found serious XSS site bugs

Bounty programs benefit everyone. Companies like Microsoft get help from security experts, customers gain improved security, and those who discover and report vulnerabilities reap the rewards financially. Or at least that's how things are supposed to work.

Having reported a series of security problems to discount and deal site Groupon, security researcher Brute Logic from was expecting a pay-out -- but the site refuses to stump up the cash. In all, Brute Logic reported more than 30 security issues with Groupon's site, but the company cites its Responsible Disclosure policy as the reason for not handing over the cash.

Continue reading

Bag yourself $15,000 as an Azure or Project Spartan bounty hunter

Bag yourself $15,000 as an Azure or Project Spartan bounty hunter

It's not unknown for technology companies to run bounty programs that reward bug hunters for unearthing problems with software. Discover a security vulnerability and you could be in line for a nice cash bonus. Microsoft is one firm that runs such a program, and today the Microsoft Bounty Program is being expanded -- with a particular focus on Azure and Project Spartan.

Microsoft has already been asking for feedback about Windows 10 Technical Preview, but this is the first time a financial reward has been offered for pointing out security issues with any of its components. The maximum pay-out has been increased to $15,000 USD, so there's more incentive than ever to seek out problems and report them to Microsoft.

Continue reading

You're more likely to be struck by lightning than hit by mobile malware

mobile lightning

We constantly see stories about the latest threat from malware, particularly relating to mobile devices. But is it really as bad as it's made out to be?

No, says threat detection and containment specialist Damballa which is unveiling new research based on its big data analysis of almost half of US mobile traffic.

Continue reading

Cybercrime gets smarter and more complex

Hacker detection

There are 85,000 new malicious IPs launched every day and the top phishing targets are technology companies and financial institutions.

These are among the findings of a new report from threat intelligence and security company Webroot. The Webroot 2015 Threat Brief provides the latest cyber threat trends collected from tens of millions of users and over 30 security technology partners.

Continue reading

iOS 8 vulnerability can send iPhones, iPads into reboot loop

16GB iPhones and iPhones quake in fear as Apple increases maximum app size to 4GB

At the 2015 RSA Conference, security researchers from Skycure showcased a new iOS 8 vulnerability which, if properly exploited, can send iPhones and iPads connected to a malicious hotspot into a reboot loop. The vulnerability affects both the operating system as well as apps which use SSL to communicate.

All that an attacker has to do to exploit the vulnerability is to set up a router in a "specific configuration", and allow anyone to connect (basically make it an open hotspot). The iOS 8 devices that connect will be affected, without the attacker having to have access to them.

Continue reading

IBM brings threat analytics to the cloud

ibm logo

Last week we reported on IBM's decision to open up its threat intelligence data in X-Force Exchange to help fend off cyber attacks.

Today the company is making its threat intelligence system QRadar available as a cloud service, giving companies the ability to quickly prioritize real threats and free up critical resources to fight cyber attacks.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.