Ian Barker

Symantec launches neural network device to protect critical infrastructure

Symantec ICSP Neural

Operational technology is critical in areas like energy, oil and gas, manufacturing, and transportation, but it's often be based on legacy systems which can be difficult to keep secure, with updates often needing to be carried out using USB devices.

The threat of attacks is very real though and the consequences especially disastrous, yet many control systems are running outdated software, leaving them vulnerable to attack.

Continue reading

Latest malware tries to avoid detection and maintain persistence

Malware magnifier

Malware is constantly evolving in an attempt to steal data or make money for the people behind it. A new report by Malwarebytes Labs reveals the latest shift towards attacks that can avoid detection but also stay on a system to be reactivated later.

Using fileless malware is just one example among many attack methodologies currently evading traditional security defenses and maintaining persistence.

Continue reading

Popular VTech children's tablet can be easily controlled by hackers

controlling hacker

Risk management and cybersecurity specialist SureCloud has discovered that the popular VTech Storio Max children's tablet can easily be hacked, enabling criminals to take control of the devices and snoop on unsuspecting victims.

This can be done by simply adding an image or link to a website. When accessed by a child via the tablet's web browser, the exploit would attack the tablet and enable the attacker to take full control of the device.

Continue reading

Fake ransomware 'cures' actually just pay the scammer

money envelope bung

In an interesting new trend some companies are claiming to be able to unlock encrypted files following a ransomware attack, but are in fact simply acting as brokers between victims and attackers.

Researchers at Check Point have discovered a Russian IT consultancy named Dr. Shifro that claims to unlock and recover consumers' and businesses' encrypted files.

Continue reading

100 million Quora users data exposed in major breach


Question and answer site Quora has revealed that its user data has been compromised as a result of unauthorized access to its systems by a 'malicious third party'.

The breach occurred on Friday and Quora is still investigating the causes. It has taken the step of logging out all users who may have been affected and forcing them to reset their passwords. It also says it will continue to make security improvements.

Continue reading

Enterprises struggle to fill the cloud skills gap

Cloud skills gap

According to a new study 94 percent of respondents find it at least 'somewhat difficult' to recruit candidates with the right technology and business skills for driving digital innovation.

The report from AIOps platform company OpsRamp shows that over 60 percent of IT professionals say that a majority of their applications are either built or run using hybrid cloud architectures.

Continue reading

DDoS attacks on eCommerce reach their highest levels over the Black Friday weekend

DDoS attack start

Cybercriminals are just as keen to exploit the holiday shopping boom as anyone else, with DDoS attacks on eCommerce providers increasing by over 70 percent on Black Friday compared with other days in November. On Cyber Monday, attacks increased by 109 percent compared with the November average.

Cloud anti-DDoS company Link11 has released data showing several attacks observed during Black Friday and Cyber Monday were of up to 100 Gbps bandwidth, and the average attack volume on both days was just under 6Gbps.

Continue reading

Americans most worried about attacks on the financial sector

Cybercriminal with cash

Americans are more worried about a cyberattack disrupting the financial and banking system than attacks against hospital/emergency services, voting systems or power grid/energy supply companies.

This is among the findings of a survey by ESET to mark National Critical Infrastructure Security and Resilience Month, which surveyed 1,500 Americans to discover their views on critical infrastructure attacks.

Continue reading

Free tool helps developers spot open source security risks

open source

The use of open source components in development projects is commonplace, but vulnerabilities in these components can be easily overlooked and leave the resulting applications insecure.

Open source security and license compliance management company WhiteSource is aiming to make it easier for developers to spot problems in components with the launch of a free tool.

Continue reading

Botnets disrupted in major anti-fraud operation

Bot net

An anti-fraud operation led by the FBI has succeeded in disrupting a scam that has seen cybercriminals using botnets to manipulate internet traffic from 1.7 million IP addresses and generate nearly 30 million dollars in fraudulent ad revenue.

The ad fraud ring, known as '3ve' had been operating for a number of years and built two different botnets by spreading Kovter and Boaxxe malware to individuals through spam emails and drive-by downloads.

Continue reading

Internet traffic set to explode over the next five years

Internet Worldwide Globe Connections

By 2022 more IP traffic will be created on global networks than in the entire 32 year life of the internet to date.

This rather startling prediction comes from network infrastructure specialist Cisco which reckons that by 2022, 60 percent of the global population will be internet users. More than 28 billion devices and connections will be online, and video will make up 82 percent of all IP traffic.

Continue reading

Protecting the US voting infrastructure [Q&A]

Ballot box

It's two years since international forces interfered with the security of the US elections. However, with the US midterm elections behind us and the presidential elections ahead, vulnerabilities in the country’s voting infrastructure still remain.

Simply put, it's not hard to hack into US voting systems. Don't believe it? Just ask the 11-year old who hacked a replica of the Florida election website to change results in under 10 minutes. We might not have seen widespread cyberattacks on the day of the midterms, but as we saw multiple opportunities for hacking and disruption in the run up, the presidential elections are already at risk.

Continue reading

Cyberattacks set to spike over the Black Friday/Cyber Monday weekend

Cyber attack

Businesses should expect to see a spike in potential cyberattacks starting with Black Friday and Cyber Monday and continuing throughout the holiday shopping season, according to a new report.

The report from predictive security specialist Carbon Black shows that global organizations encountered a 57.5 percent increase in attempted cyberattacks during the 2017 holiday shopping season.

Continue reading

BullGuard and NordVPN partner to boost consumer privacy

Privacy key

As more and more of us rely on mobile devices to access the internet, traditional endpoint security solutions don’t always provide the protection we need.

Cybersecurity company BullGuard is partnering with VPN specilaist NordVPN  to launch a new consumer anonymity solution.

Continue reading

Amazon discloses names and addresses -- but doesn't disclose details

Amazon page

If you're an Amazon customer you may have received a rather strange email this morning. It states that the company has, "...inadvertently disclosed your name and email address due to a technical error."

It then goes on to say, "The issue has been fixed. This is not a result of anything you have done, and there is no need for you to change your password or take any other action."

Continue reading

© 1998-2018 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.