Almost half of popular consumer websites have poor password requirements

Password threat

Although other forms of authentication are gaining traction, the password is still the most common method of identifying yourself to websites. Levels of password security should therefore be an important consideration for online businesses, especially in eCommerce.

But a Password Power Rankings survey out today from password manager Dashlane shows that 46 percent of consumer sites, including Dropbox, Netflix, and Pandora, and 36 percent of enterprise sites, including DocuSign and Amazon Web Services, are failing to implement the most basic password security requirements.

Continue reading

Brand influence of Snapchat declines while Instagram increases

Marketing

Marketers are keen to take advantage of the latest social channels to boost their profiles, but it can be a bit of a lottery for brands to know which have the most influence on customers.

A new study by marketing platform Snaplytics has analyzed over 800 influencers in depth over the last quarter, to identify how many updates contain brand mentions, which brands are being mentioned and who mentions them on what platform.

Continue reading

New solution helps secure privileged accounts

Admin login

Privileged accounts allow access to all aspects of a company's IT infrastructure, so if they fall into the wrong hands the consequences can be disastrous.

A new hardware appliance solution from identity management specialist One Identity aims to make it easy for businesses to deploy, operate and maintain their privileged password systems.

Continue reading

New independent organization launches to promote data sanitization

disk cleaning

With security breaches and theft of sensitive data on the increase, enterprises are searching for ways of keeping their information secure.

One technique that can be used is data sanitization but it's still relatively unknown and often misunderstood within the technology and IT security industry. To try to change this a new independent network, known as the International Data Sanitization Consortium (IDSC), is launching to champion and promote data sanitization best practices.

Continue reading

Want your emails read? Send them on Thursday at 4pm

email icon

Email marketing has always been something of a hit and miss affair, you're sending messages off knowing that many of them will simply disappear into the black hole of the internet.

A new study by marketing platform GetResponse looks to shed some light on the most effective strategies to get your emails read by analyzing almost two billion messages.

Continue reading

Delphix partners with Azure to ease cloud migration

cloud migration

Microsoft Azure is increasingly popular as a business cloud platform, but migrating to Azure often means bringing together data from a range of sources. Lack of access to this data can hinder development and slow delivery.

Data management specialist Delphix is launching a new Dynamic Data Platform for Azure, which offers enterprises the ability to streamline cloud migration projects, accelerate development and testing, and significantly reduce cost and complexity.

Continue reading

Security teams lack the right endpoint detection tools

endpoint protection

A new survey of IT and security professionals reveals that many teams lack the appropriate endpoint detection and response tools to quickly and efficiently deal with security alerts without the need to take endpoints offline to re-image them.

The survey of 385 North American professionals by forensic security specialist Guidance Software reveals that 95 percent of respondents say advanced software functionality for malware removal and system recovery -- without the need to re-image a system -- is important in an endpoint security suite.

Continue reading

Malicious SSL content more than doubles in six months

hacker

As the overall percentage of encrypted traffic increases, hackers are increasingly using SSL to conceal device infections, and hide their other activities.

A new study from Zscaler finds that an average of 60 percent of the transactions in the Zscaler security cloud have been delivered over SSL/TLS.

Continue reading

The return of the long-lasting DDoS attack and the rise of RDoS

DDoS attacks

The latest DDoS intelligence report from Kaspersky Lab shows that long-lasting attacks are making a comeback.

The longest attack in the second quarter of this year was active for 277 hours (more than 11 days) -- which is a 131 percent increase compared to the first quarter and a current record for the year.

Continue reading

Attacks from unknown threats increase by 40 percent

unknown threat

The second quarter of this year has seen two of the largest recorded cyber attacks in WannaCry and NotPetya, and the latest quarterly report from Panda Security reveals there's been an increase in unknown threats too.

PandaLabs analyzed attack data collected from all devices protected by one of Panda Security's solutions and discovered a 40 percent increase in attacks from unknown threats from the previous quarter.

Continue reading

New storage platform offers data protection and seamless scaling

Hard Drive

In the past companies have relied on different secondary storage solutions for backup and recovery, and for archiving large amounts of structured and unstructured data.

But as businesses need to store larger amounts of more diverse data this creates headaches for administrators as the same information collects on both solutions and may need to be handled via different interfaces.

Continue reading

71 percent of SMBs are not prepared for cyber security risks

SMB laptop

Small and medium sized businesses increasingly feel that they're vulnerable to cyber threats but most aren't prepared to meet them.

A new survey from endpoint security specialist Webroot finds that 96 percent of businesses with 100 to 499 employees in the US, UK and Australia believe their organizations will be susceptible to external cybersecurity threats in 2017. But although they recognize the threats, 71 percent admit to not being ready to address them.

Continue reading

How Amazon Echo could be used to spy on you

Eavesdropper glass

As we acquire more voice activated smart devices, there's always the risk that they could be eavesdropping on day-to-day conversations.

We've already seen reports of spying TVs, and now MWR InfoSecurity has exposed a vulnerability in Amazon Echo that can turn it into a listening device without affecting its functionality.

Continue reading

Cyber criminals target mortgage transactions as they phish for a big catch

house mortgage phishing hook

Buying a house is the biggest purchase most people make, with large amounts of money involved it’s not surprising that these transactions are attractive to cyber criminals.

Security specialist Barracuda Networks has released an analysis of a recent mortgage spear phishing attempt where an attacker attempted to divert a payment.

Continue reading

Samsung launches new platform to monetize IoT data

IOT_Internet_of_Things_2017

The IoT can represent a cultural shift for hardware makers as they move from just selling hardware to providing a connected digital experience.

But supplying applications and supporting an ecosystem of third-party devices, apps and services has a cost which either needs to be absorbed or factored into the price of the product. Samsung is addressing this problem with the launch of its ARTIK Cloud Monetization, a new service to monetize the data shared by IoT devices and enable an IoT data economy.

Continue reading

Load More Articles