A year on from the home working surge, cybersecurity practices are still inadequate

home working

A new report from cybersecurity firm PC Matic finds that one year on from the start of the COVID-19 pandemic, nearly 35 percent of Americans are still working from home.

However, the study of more than 5,800 people across the US finds less than 10 percent of respondents are provided with an antivirus software solution for the personal device they use for work purposes.

Continue reading

How AI can help prevent 'catastrophic forgetting' of malware data

reminder, knot in handkerchief

With large numbers of new samples appearing every day the old signature-based methods of malware detection have become unwieldy.

AI can learn from millions of samples, but if it uses all samples for optimum detection that means slower learning and updates. The alternative is to use only select samples to keep up with the rate of change of malware, but this runs the risk of 'catastrophic forgetting ' of older patterns.

Continue reading

Talent shortage impacts security awareness efforts

Security breach

Over three-quarters of security awareness professionals are spending less than half their time on security awareness, according to a new report from SANS.

This underlines the fact that awareness training is often a part-time effort, commonly assigned to staff with highly technical backgrounds but who may lack the skills needed to effectively engage their workforce in simple-to-understand terms.

Continue reading

Threat data helps enterprises strengthen security

Threat

Threat data feeds can help enterprises strengthen their cybersecurity posture, according to a new report from Ponemon Institute, sponsored by IT services company Neustar.

A majority (79 percent) of the more than 1,000 security professionals taking part in the study say threat data feeds are essential to their organization's ability to achieve a strong cybersecurity posture, and 55 percent rate the quality of their threat feeds' ability to pinpoint cyberthreats as very high.

Continue reading

How changes to tracking will affect the online world [Q&A]

surveillance tracking

The Identifier for Advertisers (IDFA) is a random device identifier assigned to a user's device which advertisers use to track data so they can deliver customized advertising.

But Apple is about to replace the iOS IDFA tracking system in iOS 14 with a new App Tracking Transparency (ATT) feature which will allow iPhone users to opt-out of tracking on third-party apps and sites. This, plus Google's crack down on third-party cookies, means privacy is a hot topic currently -- and all signs point to even more shifts in the coming year.

Continue reading

Three billion spoofed emails sent each day

Email fraud

A new report looking at trends in DMARC adoption shows that while take up of the identity verification technology is increasing, three billion messages per day are still spoofing the sender's identity.

The study from Valimail shows that email remains a favourite attack route, implicated in over 90 percent of all cyberattacks with the pandemic providing a new focus.

Continue reading

Return to offices means new opportunities for phishing

Phishing

The move to home working provided new opportunities for phisherfolk, but as many people start to return to their offices the attackers are pivoting to exploit that too.

A new report from email phishing protection specialist INKY shows attacks are capitalizing on vulnerability and the desire for accurate information about returning to the office in-person.

Continue reading

Get AOMEI Backupper Pro (worth $29.95) FREE

Backup key

We all know we should backup our data to keep it safe in the event of problems, but it's a task that often gets neglected.

To mark World Backup Day on March 31st, AOMEI is giving BetaNews readers the chance to make their backups easier by geting its Backupper Professional Edition software -- worth $29.95 -- completely free.

Continue reading

Why email is still the favorite way of delivering cyberattacks [Q&A]

Email attack

Although business IT has seen many changes over the last year, email remains the main vector for carrying out cyberattacks.

In its latest Global Security Report Zix looks at the trends in email attacks over the last year and the impact they have. We spoke to David Wagner, president and CEO of, Zix to find out more.

Continue reading

Cybercriminals keen to cash in on vaccine interest

Vaccination

The past few months have seen plenty of news surrounding COVID-19 vaccines, from the buzz surrounding roll outs to fears of possible side effects.

As always with a major news event cybercriminals seek to exploit the opportunity it presents. Cloud-native email security company GreatHorn has identified a new pattern of techniques being used to exploit the unease of vulnerable email users by spoofing critical vaccine information.

Continue reading

Facebook enables the use of hardware security keys on mobile devices

facebook_on_mobile_phone

Facebook is expanding support for physical security keys to mobile devices in order to help users secure their accounts.

The site already offers multi-factor authentication via SMS or authenticator apps, but adding support for hardware keys offers users another means of supplementing their passwords and keeping their accounts more secure.

Continue reading

Phishing campaign uses US tax season to lure victims

Tax scam

Researchers at Cybereason have detected a new campaign targeting US taxpayers with documents that purport to contain tax-related content.

These deliver NetWire and Remcos -- two powerful and popular RATs which can allow attackers to take control of the victims' machines and steal sensitive information. The malicious documents used are roughly 7MB in size, which allows them to evade traditional AV mechanisms and heuristic detection.

Continue reading

Cloud moves continue despite challenges

cloud button

Enterprises are keen to achieve the many business, technical and financial benefits of moving legacy systems to the cloud despite challenges along the way.

A new report from SAP to AWS migration specialist Lemongrass finds 77 percent of IT leaders say their primary motivation for migrating legacy systems to cloud infrastructure is either a desire to secure data, maintain data access or save money.

Continue reading

Overcoming SaaS platform tech debt [Q&A]

SaaS

The rapid shift to remote working has accelerated digital transformation and mass-cloud migration across almost every organization -- even those who weren't necessarily ready for it.

As IT professionals settle into long-term planning and management of their SaaS platforms and apps, CoreView's SVP Doug Hazelman believes they must now begin to effectively manage their cloud infrastructure so they can focus on maximizing the value of their investments. We spoke to him to learn more.

Continue reading

Excess permissions put Android app users' data at risk

Android phone home screen

Over a third of the 1,020 most-downloaded Android apps on the Google Play store request access to a user's camera -- despite no obvious benefit for user experience and potentially placing sensitive data at risk.

Research from CyberNews also shows one in three apps request access to track a user's precise, or approximate, location. Excluding those that require such access to function, such as weather or navigation, applications attempting invasive access included gaming and even wallpaper, which appear to have no legitimate reason to track location data.

Continue reading

Load More Articles