Network security and intelligence company WatchGuard Technologies has released its internet security report for the third quarter of 2019 showing the most popular network attacks.
Apache Struts vulnerabilities -- including one used in the devastating Equifax data breach which tops the list -- appeared for the first time on WatchGuard's list. The report also highlights a major rise in zero day malware detections, increasing use of Microsoft Office exploits and legitimate penetration testing tools, and more.
New data published by INAP at Gartner's IT Infrastructure, Operations and Cloud Strategies Conference in Las Vegas this week reveals the top challenges IT professionals expect to face in 2020.
Migrating applications to the cloud tops the list for 37 percent (up from 34 percent last year) while protecting against cyber attacks is in second place chosen by 31 percent (down from 36 percent).
An exploitable design flaw with a smart lock means attackers can easily overcome it and the lock's inability to receive updates means it can't easily be fixed.
Researchers at F-Secure found they were able to exploit poorly designed protocols in the KeyWe Smart Lock to intercept the secret passphrase that controls the lock as it's exchanged between the physical device and the mobile app.
With the California Consumer Privacy Act (CCPA) coming into force in January and GDPR in Europe having been active for nearly two years, data privacy is something that's being taken more seriously than ever.
But what impact does legislation have on businesses and consumers? And how has GDPR influenced the drafting of CCPA? To find out we spoke to Sophie Stalla-Bourdillon, senior privacy counsel and legal engineer and Dan Wu, privacy counsel and legal engineer, from data governance specialist Immuta.
A rapid increase in the number of security tools used by large companies is limiting their return on investment while increasing the risk of cyber threats, according to a new report.
The study from enterprise security specialist ReliaQuest finds that there is a 'security tool tipping point' where the number of cybersecurity solutions becomes overwhelming and actually increases organizational risk levels.
As the IT skills shortage continues -- and organizations consider strategies to meet the shortfall -- outsourcing application development to experts is becoming a reality. But why are those skills outsourced, and what are the potential risks of outsourcing?
We spoke to Sreedhar Veeramachaneni, CEO and founder of System Soft Technologies, a Florida-based IT products, services, and solutions company focused on helping organizations optimize their IT processes and infrastructure.
With the security of IDs and passwords increasingly under scrutiny, more people are becoming interested in using biometrics to verify their identity and authorize payments.
Technology education course guide Computer Science Zone has produced an infographic looking at the advantages of biometrics and how they are gaining in popularity.
A new study shows a 29 percent increase in suspected online retail fraud during the start of the 2019 holiday shopping season compared to the same period in 2018, and a 60 percent increase over the same period from 2017 to 2019.
The findings from iovation, the fraud prevention arm of TransUnion, are based on the online retail transactions analyzed for its e-commerce customers between Thanksgiving and Cyber Monday over the last three years.
The move to new business models for software, such as subscription services and SaaS, will require suppliers to better understand their customer relationships and offer improved usage data, says a new report.
The study from Flexera suggests that with subscription and usage-based models comes a demand for consistent, persistent level of customer engagement, supported through compliance and transparency.
Millions of people and hundreds of thousands of businesses in the UK are using cracked or weak passwords for their online accounts according to new research.
Cybersecurity and data analytics CybSafe has conducted a blind-analysis of the passwords used by over 21,000 staff at a sample group of 250 UK businesses, and finds that three quarters are employing staff with vulnerable password combinations -- either passwords which are too simple, or which have been compromised in previous data breaches.
Poor passwords frequently provide hackers with a way into networks. In order to help security teams and penetration testers identify them, Trustwave is launching a new cracking tool.
CrackQ is a queuing system to manage password cracking that works with the Hashcat tool which uses the power of GPUs to crack passwords.
The insurance industry has been around for over 300 years, but the rise of small, agile businesses employing new technology like AI is disrupting life for more established players.
A study from IT and consulting firm NTT DATA shows 'insurtech' startups have globally raised more than $11bn in the last three years, more than double previous years.
Mass cyber attacks are now being outnumbered by targeted attacks, with 65 percent of the total in the third quarter of 2019 being targeted, compared to 59 percent in the previous quarter.
The latest threatscape report from Positive Technologies also shows data theft grew to 61 percent of all attacks on organizations and 64 percent of all attacks on individuals (compared to 58 and 55 percent respectively in the second quarter). The share of attacks with direct financial motivation was 31 percent.
Digital transformation is becoming an essential part of many business initiatives and of course security is a high priority too. You would think that two such essential areas would exist in close harmony, but it isn't always the case.
In the age of digital transformation security can get left behind. So, what can businesses do to ensure that new digital initiatives are secured from the start? We spoke to John Worrall, CEO at application and infrastructure security specialist ZeroNorth to find out more.
Cyber-attacks represent a real threat to unprotected healthcare mobile apps. The overall operational integrity of these apps is at risk, but there's also a significant risk of malicious attacks on the medical devices themselves, personal health information, and intellectual property.
We spoke to Rusty Carter, VP of product management at Arxan to find out more about the risks and how they can be addressed.