Articles about Security

UK government launches voucher scheme to boost small business security

Pound padlock

For smaller businesses cyber security isn't always their highest priority which means they can be left vulnerable to attacks.

In an effort to beef up protection for small and medium businesses, the UK government is launching a voucher scheme as part of a package of measures designed to increase the resilience of UK businesses to cyber-attacks.

Continue reading

Malwarebytes Anti-Malware for Mac 1.0 is a simple on-demand scan-and-remove tool

mbam-mac-200x175

Security developer Malwarebytes has unveiled Malwarebytes Anti-Malware for Mac 1.0, the company’s first Mac product.

The new app hasn’t been coded from scratch, but is a rebranded (and updated) version of AdwareMedic, which was acquired by Malwarebytes back in March.

Continue reading

Microsoft no longer providing any form of security for XP

Windows XP

Bad news, yet again, for those Windows users stubbornly refusing to leave XP. Microsoft might have ended support for the ancient OS back in April 2014, but it was still providing the Malicious Software Removal Tool and updates to Microsoft Security Essentials, offering a modicum of security.

However, as of this week, XP users will no longer receive those updates, leaving them exposed to more threats.

Continue reading

Prevent people printing, copying, and downloading your shared Google Drive files

web_padlock

The likes of Google Drive make it easy to collaborate on projects, harnessing the power of the cloud to provide people with access to files. While it's handy to be able to work on files with other people, there are times when you want to ensure that the documents you share are not misused.

With this in mind, Google has now added new permission options to shared files. With the added ability to prevent the copying, downloading, and printing of files, it's now safer to share confidential documents. As Google says, it's "perfect for when the file you're sharing contains sensitive information that you don't want shared broadly or leaked".

Continue reading

Consumers are ready to accept Identity 3.0

login password identity

There's always a trade off between access and security. Identity management specialist Gigya has released its latest State of Consumer Privacy & Personalization report looking at consumer attitudes surrounding data privacy.

A key finding is a growing willingness to accept next-generation authentication methods known as 'Identity 3.0'. Biometric technologies are emerging as a popular option for signing in. The study shows 41 percent of consumers have a high level of comfort logging in to a site or mobile app using a thumbprint or face/eye scan.

Continue reading

Pssstt! Wanna host some malware?

gift hacker criminal present

Whilst it's the hacks and the data breaches and the information thefts that grab the headlines, no one ever mentions the technology that lies behind them.

Where do the bad guys host their malware and where do they keep their stolen information? Like any legitimate online businesses, cybercriminals need a reliable, high availability hosting infrastructure.

Continue reading

Two-thirds of time spent responding to malware alerts is wasted

Security alert

Organizations are increasingly bombarded with malware reports and that can lead to wasted time dealing with false alarms or minor issues.

A new report from The Ponemon Institute, commissioned by breach defense specialist Damballa, reveals that two-thirds of the time spent by security staff responding to malware alerts is wasted because of faulty intelligence.

Continue reading

Mozilla blocks all versions of Flash in Firefox amid growing security concerns

Adobe Flash Blocked in Firefox

As you may or may not know, Adobe Flash -- a veteran tool required by many modern browsers for video playback -- is riddled with vulnerabilities. The product has a long history of being thrown under the bus for its security incompetence. Such is the case today. Mozilla announces that it is blocking all versions of Flash Player in its browser with its latest update.

Mark Schmidt, the head of the Firefox team at Mozilla notes that the company is disabling Adobe Flash by default in the browser. The block is accompanied by an image showing a raised fist and the phrase "Occupy Flash". Users who wish to enable Flash can do so by flipping switches in the settings menu, however.

Continue reading

Hacking Team to conjure up new surveillance software after security breach

hacking_team_hacked

Following a massive security breach, Italian security firm Hacking Team warned that its government-strength surveillance tools could have fallen into the hands of terrorists. The company advised its customers -- including governments and law agencies around the world -- to stop using its software, and is now launching something of a damage-limitation exercise.

Hacking Team has released a statement indicating that far from giving up and admitting defeat, a new, more powerful version of its software will be released soon. The replacement for Galileo, called Remote Control System 10, is described as a "complete revision" of the old system and "not simply an update". The security firm also stresses that not all of its source code was compromised, only code which is considered obsolete.

Continue reading

77 percent of people are open to using password alternatives

Password key image

The username and password combination has been with us for a long time, but we're increasingly seeing its shortcomings for protecting sensitive data.

A new survey of 24,000 consumers across six continents by technology services and consulting company Accenture reveals that 60 percent of consumers find passwords cumbersome and more than three-quarters worldwide would be open to using alternatives.

Continue reading

Android users know about vulnerabilities but aren't taking precautions

Android malware

Although the majority of consumers are well aware of potential malware attacks on the Android platform, and they overwhelmingly understand the importance of mobile security, they're still not taking the steps needed to safeguard their devices and they’re reluctant to pay for protection.

This is among the findings of a new survey of more than 100 Android users from Chinese company 360 Security. It shows that Android mobile users worry most about untrustworthy apps (27 percent), online payments (20 percent), and hackers (13 percent).

Continue reading

Second zero-day flaw found in Adobe Flash thanks to Hacking Team

Security attack

Earlier this week an exploit for Adobe Flash was revealed -- a shock, I know. Now a second is in the wild and already being used. Known by the catchy name CVE-2015-5122, security firm FireEye discovered the flaw buried in the Hacking Team leak and alerted Adobe to it.

Adobe has released a security bulletin stating "Critical vulnerabilities (CVE-2015-5122, CVE-2015-5123) have been identified in Adobe Flash Player 18.0.0.204 and earlier versions for Windows, Macintosh and Linux. Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system".

Continue reading

Here's how Windows Hello login works in Windows 10

hello

One of the more intriguing new features of Windows 10 is Windows Hello. If you're sick of typing a password to log into your account, but don’t want to do away with security altogether, you can use this biometric feature to log in using your face or fingerprint.

Windows Hello works in conjunction with Microsoft Passport to lock down your system, but the facial recognition feature is only compatible with certain hardware. This fact means that it has been hard to try out Windows Hello, but over on SuperSite for Windows Richard Hay got his hands on an Intel RealSense 3D Camera (F200) and recorded a demo of how it works.

Continue reading

Microsoft's 'feeble' enterprise security and virus protection is the worst

hole_in_the_wall

Tests carried out by independent security labs AV-Test show that Microsoft is at the bottom of the league when it comes to enterprise security and virus protection. The tests pitted 11 security solutions against each other, and Microsoft's Endpoint Protection 2012 from the Microsoft Management Suite System Center 2012 was found to offer the weakest protection.

In both enterprise network security tests and virus detection tests, Microsoft trailed behind the competition in eleventh place. What's particularly concerning is that as the tool tested is bundled software, it's likely that it is precisely what many businesses are relying on for protection.

Continue reading

Chrome blocks access to torrent sites

danger_sign

Chrome users who download torrents may be thinking about switching to a different browser. Google's web browser is now blocking access to a number of big name torrent sites. This is not a case of Google taking the moral high ground about the rights and wrongs of torrenting, but part of the search giant's security program to protect users from "harmful programs".

Starting yesterday, downloaders found that access was blocked to ExtraTorrent and KickassTorrents, although the block was later lifted. The block remains in place for other torrent sites including kat.cr. Upon attempting to visit an affected site, would-be torrenters are greeted by a red, full-screen security warning that advises of the potential danger of the site in question.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.