Ian Barker

QR code use grows in popularity but poses hidden risks

QR code

The use of QR codes has risen during the pandemic as they offer a perfect solution to contactless interaction. But many employees are also using their mobile devices to scan QR codes for personal use, putting themselves and enterprise resources at risk.

A new study from security platform MobileIron shows that 84 percent of people have scanned a QR code before, with 32 percent having done so in the past week and 26 percent in the past month.

Continue reading

Contact tracing apps raise privacy fears

Contact tracing

Most US consumers believe in the effectiveness of contact tracing apps to curb the spread of COVID-19, but a new report shows almost half would refuse to download them over data privacy concerns.

A study sponsored by SecureAge Technology has surveyed more than 580 consumers and over 300 IT professionals to find out their perceptions on the use of contact tracing apps.

Continue reading

Dashlane launches new password health reporting tool for businesses

Password on a PostIt

Good security practices are more important than ever in the current climate, with people working from home using their own devices.

Password management specialist Dashlane is launching a new reporting tool that gives company administrators in-depth visibility into employee password security along with the ability to track improvements over time.

Continue reading

Organized attacks on cloud infrastructure and software supply chain increase

Broken chain

A new threat report from Aqua Security reveals a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure.

While most attacks uncovered by Team Nautilus, Aqua's cybersecurity research team, were aimed at abusing public cloud compute resources for cryptocurrency mining, the methods used also open the door for higher-value targets that look to exploit security gaps in container software supply chains and runtime environments.

Continue reading

Fast growth leads to challenges as pandemic drives eCommerce to an all-time high

eCommerce

The fastest-growing eCommerce companies share a number of key characteristics, among them being able to keep up with technology change, shipping orders in a timely manner, and providing real-time insights on the status of an order.

This is among the findings of a new report from API transformation company Jitterbit, which also shows that as the number of applications requiring integration and the number of integration challenges rises, so does businesses' reliance on integration vendors.

Continue reading

Size matters when it comes to cybersecurity

large and small

Research from Coalfire Labs based on over 800 penetration tests finds that company size has a direct bearing on how effectively a business is able to fend off would-be attackers.

The study shows large and small companies see more than three times the year-on-year improvement of medium-sized companies. Although mid-size companies hit the cybersecurity sweet spot in 2018, they scrambled to keep up last year, and in 2020, improving only four percent year-on-year in fending off attackers compared to their bigger and smaller counterparts.

Continue reading

Zoho launches new platform to boost collaboration and productivity

Zoho logo

Business suite company Zoho is launching a new software platform that brings together collaboration, productivity, and communications tools and integrates them into other business processes.

Zoho Workplace is based around a fully-featured business mail and cloud office suite. It includes nine applications built on a common data model and unified through common search and AI across a single dashboard.

Continue reading

New development environment streamlines the creation of business apps

code

Low-code techniques help businesses to develop applications quickly, but in some cases they can lead to added complexity.

With the launch of OXIDE, an Integrated Development Environment (IDE), JourneyApps is seeking to combine the speed and efficiency of low-code platforms with the flexibility and power of professional development, all in a single platform.

Continue reading

Why vishing is the new phishing and how to guard against it [Q&A]

vishing smishing

We're all familiar with the menace of phishing but, particularly following the recent Twitter attack, other methods of stealing credentials have been on the rise.

These include 'smishing' (phishing via SMS) and 'vishing' (phishing by voice call). We spoke to Ed Bishop, CTO at email security company Tessian to find out how businesses can identify vishing and smishing attacks, how the attacks work, and how companies can protect their employees.

Continue reading

New platform helps businesses get the most from data lakes

real-time data

Data is key to the competitiveness of modern enterprises, but the quality of that data determines how useful it is.

Customer data platform Segment is launching a new data architecture product built specifically to help companies deliver better customer experiences. Segment Data Lakes gives companies a foundation to produce advanced analytics, uncover customer insights, and power machine learning and AI initiatives.

Continue reading

60 percent of emails in May and June were fraudulent

Malicious email

The COVID-19 pandemic has seen a spike in scams, phishing and malware across all platforms and attack vectors. The latest mid-year threat landscape report from Bitdefender shows that in May and June, an average of 60 percent of all received emails were fraudulent.

In addition there’s been a five-fold increase in the number of coronavirus-themed attacks and a 46 percent increase in attacks aimed at home IoT devices.

Continue reading

Remote work puts extra stress on SMB security teams

SMB laptop

Smaller businesses are having to do more with less in terms of security, a situation made worse by the coronavirus pandemic.

The annual SMB IT Security Report from Untangle shows that 38 percent of SMBs are allocating $1,000 or less to their IT security budget, compared to 29 percent in 2019 and 27 percent in 2018.

Continue reading

Everything you need to know about authentication

security verification

The shortcomings of password security are well known. Indeed the death of passwords has been predicted for a long time but they still cling on.

There are a number of alternative authentication methods available, but confusion still reigns about the pros and cons of different approaches. To help cut through the mass of information, identity management company Beyond Identity has put together an infographic looking at alternative authentication methods and the security each provides.

Continue reading

New threat intelligence system helps fight deepfakes

Fake/genuine

Concern about deepfakes is on the rise and earlier this week Microsoft announced its own video authentication tool ahead of the US elections.

To help counter the threat from increasingly sophisticated cyber attacks, including the use of deepfakes, biometric authentication company iProov is also launching its own Security Operations Centre (iSOC).

Continue reading

Cyberattacks and how they work

Cyber attack

Cybercriminals in 2019 managed to expose more than 165 million records of confidential data across 1,365 known breaches.

But how do they get in, how long do they stay and what are they there for? The answers to these questions are in the 2020 Compromise Flashcard produced by compromise assessment company Lumu.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.