Ian Barker

The secret life of discontinued apps

Smartphone apps

When a book goes out of print the publishers don't pop round and remove old copies from your shelves. Similarly, when an app is discontinued it can be taken off the app stores but continues to linger on users' devices.

Mobile security company Wandera has been taking a look at what happens to these with an analysis of six-months' worth of apps that were removed from the app stores, along with apps that were installed on customer devices prior to the six-month period and, subsequently, removed.

Continue reading

UK government launches fund to boost smart device security

Internet of things

It's estimated that there could be as many as 75 billion connected devices worldwide by 2025, but the increased popularity of 'smart' equipment comes with risk as many products currently on sale lack basic cybersecurity.

In response to this threat the UK's Department for Digital, Culture, Media and Sport is launching a £400,000 ($490,000) fund for innovators to design schemes to boost the security of internet-connected products.

Continue reading

Securing the remote workforce during COVID-19 and beyond [Q&A]

keyboard padlock

The COVID-19 global pandemic has created a cybercrime playground. From phishing scams to ransomware to social media attacks, COVID-19-focused malware campaigns are on the rise. In fact, according to research from Zscaler, there's been a 30,000 percent increase in coronavirus-related attacks.

We talked with Mike Kelley, CSO at Navisite, to discuss why the current crisis is causing such a dramatic spike in cybersecurity activity, as well as ways organizations can secure their remote workforce and protect their organization from cyberthreats both now and after the COVID-19 pandemic comes to an end.

Continue reading

Massive amounts of corporate data now stored on employee USB devices

flash drive and laptop

There has been a 123 percent increase in the volume of data downloaded to USB devices by employees since working from home has become widespread due to coronavirus.

What's more, according to a report from SaaS data protection company Digital Guardian, 74 percent of that data is subject to organisation data governance policies.

Continue reading

Updated platform offers zero-trust management of multi-clouds


Multi-cloud environments tend to be harder to secure because teams and applications are much more distributed resulting in a larger attack surface.

A zero-trust approach deals with these threats but can introduce overheads that make it hard to manage. Morpheus Data is integrating VMware NSX-T and Unisys Stealth technology into its cloud automation framework to enable microsegmentation and dramatically simplify the implementation of zero-trust processes.

Continue reading

Turn off the security please, I'm the boss

employee snoop

The C-suite is the most likely group within an organization to ask for relaxed mobile security protocols (74 percent) -- despite also being highly targeted by cyberattacks according to a new study.

The report from zero-trust platform MobileIron finds that executives feel frustrated by mobile security protocols and often request to bypass them.

Continue reading

Three-quarters of organizations fail to complete legacy system modernizations

success v failure

New research from Advanced shows that 74 percent of organizations have started a legacy system modernization project but failed to complete it.

The report also suggests a disconnect between business and technical teams could be to blame. CIOs and heads of IT are more interested in the technology landscape of their organisation as a whole, whereas enterprise architects are more internally focused.

Continue reading

Safe working practices suffer when working remotely

using laptop with sharks

Almost half of employees are less likely to follow safe data practices when working from home according to a new report from email security firm Tessian.

While 91 percent of IT leaders trust their staff to follow best security practices when working remotely, over half of employees (52 percent) believe they can get away with riskier behavior when working from home.

Continue reading

Organizations want to continue remote work but aren't equipped for secure access

working from home

The current crisis has led to a big increase in numbers of people working remotely. Many businesses seem set to continue that when normality returns, but a new report suggests they're not equipped to do so securely.

The study from cloud security company Bitglass shows that 41 percent have not taken any steps to expand secure access for the remote workforce, and 50 percent are citing proper equipment as the biggest impediment to doing so. Consequently, 65 percent of organizations now enable personal devices to access managed applications.

Continue reading

DNS traffic and DDoS events rise during pandemic

hand on world map

New research from DNS intelligence specialist Farsight Security, focusing on over 300 leading websites, finds that between March and April there has been an increase in DDoS events involving popular brand names.

It also reveals that DNS cache misses (which occur when the data fetched is not present in the cache) showed an increase of between four and seven times.

Continue reading

How to move beyond the burden of legacy systems [Q&A]

legacy system

These days, companies are seeking to stay competitive and current by pursuing and succeeding at end-to-end digital transformation.

Successful digital transformation brings a myriad of benefits to organizations of all types, including operational efficiencies, improved customer engagement and digitally-enabled sales and service. However, organizations can't fully embrace and reap the benefits of digital transformation if they're still relying on their old legacy environment.

Continue reading

Android handsets found to have region-specific security issues

Android hazard sign

Android is the most popular smartphone OS, but new research suggests that its security landscape is fragmented due to region-specific issues that affect users in some countries but not others.

Researchers at F-Secure examined devices including the Huawei Mate 9 Pro, the Samsung Galaxy S9, and the Xiaomi Mi 9 to understand the exploitation process for vulnerabilities and configuration issues, as well as the impact, and found it varies from device to device.

Continue reading

The effect of GDPR two years on

GDPR logo

Today marks the second anniversary of the introduction of the EU's General Data Protection Regulation (GDPR).

With privacy in the spotlight at the moment due to COVID-19 tracing apps, we got the views of some industry experts on the effect that GDPR has had on our individual privacy and on the way businesses handle data.

Continue reading

One-in-50 online transactions was fraudulent in 2019


Two percent of transactions in online banking and online retail were carried out by fraudsters, and 16 percent of transactions were suspicious and required further investigation according to new analysis by Kaspersky.

Based on anonymized statistics of events detected by Kaspersky's anti-fraud solution from January to December 2019, the most common case of fraud (63 percent) was attempts to access personal accounts using malware or legitimate remote control software.

Continue reading

Key cybersecurity trends for 2020

Paradyn graphic header

With the current focus being very much on the shift to remote working and the challenges and opportunities it offers, it’s easy to overlook the fact that there's a whole world of other security issues out there, and it isn't standing still.

Ireland-based telecommunications company Paradyn has created an infographic looking at what it sees as the important cybersecurity trends of this year.

Continue reading

© 1998-2020 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.