Articles about Security

PingView is a versatile network monitor

PingView200-175

Managing networks is a tedious, time-consuming business, and if your needs are simple then it might be best not to bother. If a network device goes offline, so what? You can just deal with any problems as they crop up.

If several others are using your network, though, you might want to take a more proactive approach, and keep an eye on your hardware. Enter PingView, a free tool for monitoring selected devices -- or domains -- and checking they’re still online.

Continue reading

All smart home security systems are insecure

Warning Sign Sky Cloud Cloudy

Every "smart" security device in your home is vulnerable, a new study suggests.

Results of a security testing study conducted by tech giant HP show that 100 percent of the studied devices used in home security contain significant vulnerabilities, including password security, encryption and authentication issues.

Continue reading

Clean PC infections with Trend Micro Anti-Threat Toolkit

TrendMicro (1)

Trend Micro may not always make the headlines, but it produces some great antivirus products which are loved by the independent testing labs (the company came top of the list in AV-Comparatives' December 2014 Real-World Protection Test).

Detection rates aren't everything, of course, and you might prefer something else. But if your system gets infected anyway, you can try out the company's technology for free with Trend Micro Anti-Threat Toolkit.

Continue reading

Calm down -- Samsung refutes claims that its Smart TVs are spying on you

business man spying

The past couple of days have been a whirlwind for Samsung. Allegations have been flying about the Korean company's Smart TVs spying on users and logging information for the company. It's safe to say that people are a bit paranoid over being spied on these days; Edward Snowden had far-reaching implications. But, while a degree of paranoia isn't necessarily a bad thing, it also isn't good to have an overdose.

Samsung is now answering to those charges and its claims are much different than the accusations. While it's still difficult for most customers to actually realize what is happening, it isn't all that hard to explain.

Continue reading

New and nastier Android ransomware uses unique keys to lock data

Ransomware

The Simplocker ransomware targeting Android systems first appeared in mid 2014. Prior to Simplocker most ransomware only claimed to encrypt files but didn't actually do so.

Fortunately files locked by the malware were fairly easy to decrypt, but now researchers at antivirus company Avast have uncovered a new version of Simplocker with an even nastier trick.

Continue reading

Safer Internet Day tips for parents

School children laptop

It probably hasn't escaped your notice that today (10 February) is Safer Internet Day. This is intended to promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people.

Online advice site Knowthenet.org.uk -- operated by the Nominet domain registry -- has published some new research looking at the attitudes of parents to their children's use of social media and finds that whilst it has a generally good effect there's still a need for caution.

Continue reading

Meraki MX Firewalls: Why cloud managed networking simply rocks [Review]

mx64w-mantle

Two of the largest network gaming services, Xbox Live and PlayStation Network, took unplanned hiatuses on Christmas Day 2014. And for their credit, both Sony and Microsoft were not the culprits for the outages. Newly infamous hacking group Lizard Squad used DDoS attacks against the gaming networks to chalk up part publicity stunt and part targeted advertising for their new DDoS-for-hire service.

At this point, the who and why of this story aren't anything new if you've been watching IT news the last few weeks. But something that hasn't gotten as much attention is the "how" of Lizard Squad's Xmas Day barrage last year.

Continue reading

Nectar bolsters security as police investigate eBay points fraud

nectar

A police investigation has been launched after fraudsters targeted members of the UK’s biggest loyalty card scheme, Nectar.

Nectar, used by over 19 million people, has beefed up security after members reported fraudulent transactions on accounts that had been linked to online auction website eBay.

Continue reading

How secure is Android? And should we be worried? [Q&A]

Android danger sign

In the past malware developers and hackers have tended to concentrate on Windows. But as mobile has taken off and there's been a shift in the type of systems people use they've diversified their efforts into other systems.

In particular Android, as the most popular mobile OS, has become a prime target. We spoke to Huan Ren, chief architect at Android security and performance specialist 360 Security to get his view of the mobile security landscape.

Continue reading

Thanks to Snowden, NSA-GCHQ surveillance data sharing is now legal

Thanks to Snowden, NSA-GCHQ surveillance data sharing is now legal

A secret UK court has ruled that the UK's intelligence agency GCHQ acted unlawfully by intercepting information gathered by the NSA. Investigatory Powers Tribunal said that because the rules surrounding the UK’s access to the NSA's PRISM and UPSTREAM program data were secret, data sharing between the US and UK was illegal. A case has been brought against GCHQ by Privacy International, Bytes for All, Liberty, and Amnesty International.

But while the IPT said that accessing this information breached human rights laws this is no longer the case. Why? The illegality of sharing data collected through these surveillance programs centered on the very fact that they were secret. In blowing the whistle about what the NSA was doing, Edward Snowden unwittingly made this data sharing legal. Whoops.

Continue reading

5 ways your business is at risk from a cyber-security attack

attack

The Internet has changed the way that you do business. No matter what industry you are in, you value what your cyber network does for you in terms of connecting with clients and staying efficient.

But, with advances in cyber technologies come more cybercriminals. No matter how sophisticated cyber security technologies and firewalls get, it seems that there is still a more sophisticated hacker capable of breaching your systems and stealing sensitive data. Believe it or not, three-quarters of businesses surveyed have reported that they have experienced a security breach in the last 12 months. As you can see, you are more vulnerable than you might think, and here’s how:

Continue reading

Anthem Health Care is latest hacking victim, millions of users could be compromised

hacker

It's another year and time for a new set of companies to be compromised. In 2014 we witnessed high-profile attacks on victims such as Home Depot and Target, but 2015 is shaping up to be no better, given the recent news regarding Anthem, a major health care provider in the US. The potential implications of this one are still mostly unknown.

However, reports are surfacing that perhaps millions of users have been compromised. Data such as names and social security numbers have been lost. The company isn't yet citing numbers, but does admit that all of its branches were affected. According to security researcher Brian Krebs that could mean a catastrophe.

Continue reading

New iOS malware can steal personal information from non-jailbroken devices

virus malware infection mobile

Yesterday, I told you that Android users may be affected by malware even if they only use Google Play to get apps. Three popular, adware-riddled, titles made it past Google's security checks, remaining undetected for months -- in fact, they may still be affecting users as we speak. And if you believe that iOS is safe, you might want to reconsider. New malware has been found, affecting iOS users even if they haven't jailbroken their device. Is there nothing that's safe anymore?

Security firm Trend Micro has uncovered the malware as part of an investigation into Operation Pawn Storm, a cyber-espionage operation with economic and political targets. It is designed to steal personal information, like contact lists, geo-location data, photos, text messages and more. The malware affects both iOS 7 and iOS 8, which are found on 97 percent of Apple's mobile devices.

Continue reading

Microsoft Internet Explorer security flaw could put users at risk

Hacker detection

In terms of market share, Internet Explorer remains the top web browser thanks to being the default on Windows and average users not knowing any better. Those with a lean towards technology frequently use alternatives like Chrome and Firefox. This was a major problem in the days of IE 6, but Microsoft has improved its offering with each iteration.

But no software is perfect and security holes are found on a regular basis. This time it seems Microsoft's browser has a major one. The flaw that has been discovered can be used to exploit users via phishing attacks and malicious code insertion.

Continue reading

Lack of trust holds back app downloads

trust

Consumers are increasingly wary of downloading apps according to a new report by mobile commerce community MEF and antivirus company AVG.

The study is based on data from 15,000 mobile media users in 15 countries across five continents. It explores the key areas of trust, privacy, transparency and security to identify their impact on mobile consumers, from purchasing a new device to downloading apps or paying for goods and services.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.