Twitter proves better than the Dark Web for assessing vulnerability risk

Skeleton with twitter label

The latest report from risk management and cyber security company Nopsec looks at the use of social media in risk analysis.

Twitter in particular seems to be becoming the go-to resource for security researchers and attackers looking to disseminate proof-of-concept exploits.

Continue reading

Open source tool aims to deliver more efficient web development

Web Development

Websites are essential for businesses in the modern world, which puts web development teams under pressure to deliver results.

Open source tool specialist DRUD Tech is launching a new tool called ddev which is designed to do away with the complicated steps and disparate components of website development.

Continue reading

'App mapping' gives enterprises improved visibility into systems

Network security

The shift to containers and as-a-service delivery models introduces blind spots for many enterprises as they struggle to see the whole picture and can't determine the health of their apps and APIs.

Netsil, a new startup, is launching an innovative solution to this problem in the form of its Application Operations Center (AOC), a universal observation and monitoring platform for modern cloud applications.

Continue reading

Mobile network flaws could open Bitcoin wallets to hackers

Bitcoin phishing theft

An architecture flaw in mobile networks could allow hackers to intercept SMS one-time passwords and access Bitcoin wallets.

The vulnerability uncovered by enterprise security specialist Positive Technologies means that with just a person's first name, last name, and phone number, researchers were able learn the email address linked to the wallet, obtain control over it, and gain access to the wallet itself including withdrawing funds.

Continue reading

Majority of enterprise cloud services still not ready for GDPR

cloud-ladder

With the EU's General Data Protection Regulation set to come into force in May next year, companies are rushing to ensure that their systems will comply with its rules.

Yet a new report from cloud security company Netskope finds that almost three-quarters of cloud services still lack key capabilities needed to ensure compliance with the GDPR regulations.

Continue reading

First half of 2017 sees more mobile vulnerabilities than for the whole of 2016

Mobile app threats

A new report into mobile threats reveals that in the first half of 2017, there were more common vulnerabilities and exposures (CVEs) registered for Android and iOS than in all of 2016.

The study by mobile threat defense company Zimperium, based on data from its z3a app analysis tool, also shows that many devices aren't running the latest operating systems, leaving them vulnerable.

Continue reading

Hurricanes lead to drop in malware infections

Hurricane

An interesting side effect of the recent hurricanes Harvey and Irma is that malware infections in the Florida and Texas areas have seen a dramatic fall.

Data released by Enigma Software Group, makers of the SpyHunter anti-malware software, shows that infections in the Houston area showed a 52.5 percent drop from the average on August 29th.

Continue reading

Intelligent data platform drives digital transformation

AI

Businesses are more keen than ever to unlock the power of their data, but often struggle to come up with a strategic approach.

Cloud data management company Informatica is launching its latest Intelligent Data Platform driven by the CLAIRE engine which uses metadata-driven AI to deliver faster insights.

Continue reading

Criminals hijack browsers to mine cryptocurrency

Crypto currency

Cyber criminals supplementing their income by mining cryptocurrencies like Bitcoin is nothing new. Usually this has been done by installing malware or PUPs on the machines of unsuspecting users.

But now researchers at ESET have discovered a new method of mining cryptocurrencies, which can be done directly within your web browser, using JavaScript. This gives attackers the potential to reach a greater number of victims, by infecting websites, rather than by targeting individual machines.

Continue reading

User feedback solution helps companies build brand loyalty

tablet feedback

Companies want people to use their apps, but it can be hard to obtain feedback on what is and isn't working, and understand what customers want.

Digital experience company Applause is launching its Customer Journeys solution which delivers authentic user feedback from a range of sources including apps, marketing materials, websites, in-store, IoT devices and more.

Continue reading

Mobile apps still the 'Wild West' of online security

wild west mobile

Most app stores are still failing to adequately protect their users from malicious and fraudulent app downloads.

This is one of the findings of a new report by threat management company RiskIQ which analyzed 120 mobile app stores and more than 2 billion daily scanned resources.

Continue reading

McAfee launches new range of consumer security products

Home protection

With internet threats showing no signs of slowing down, it's vital to keep all of your devices protected and this applies in the home as much as the workplace.

With the launch today of its latest consumer products, McAfee is aiming to protect against threats as well as offering online privacy and safety for the whole family.

Continue reading

IT professionals are an underused resource for cyber security

Employee bored

It's widely accepted that there is a shortage of people with cyber security skills, yet a new study shows that companies are failing to give IT professionals -- the people implementing and operating security strategies for most organizations -- the training and responsibility they need to take on a more proactive cyber security role.

The study, from security training company (ISC)2 also reveals that many IT professionals feel their security guidance is being ignored by business leadership.

Continue reading

New data platform accelerates application development and deployment

Developer

One of the things that can hold back development of business applications the reliance on extract, transform, and load (ETL) infrastructures to move data between applications and platforms.

Platform specialist InterSystems is launching a new platform built around a high-performance database that eliminates the need for ETL.

Continue reading

Bill Gates says Britain can be a world technology leader after Brexit, but CBI demands certainty on data

Brexit EU European Union flag UK

Before the UK's referendum on leaving the EU last year, Bill Gates warned that a vote to leave could jeopardize the country’s position in the science and technology sector.

But in an interview with the Daily Telegraph (paywalled) the Microsoft founder says that Britain can remain a world leader if care is taken.

Continue reading

Load More Articles