AT&T fends off 200,000 malware attacks every day

Google stops developers and Mac users installing unofficial Chrome extensions

AT&T has revealed that its network is constantly under the threat of attack by cybercriminals looking for ways to breach its security.

Each day the company detects over 30 billion malicious scans being deployed to find weaknesses in its network. Cybercriminals often use such scans to detect security vulnerabilities that could be exploited in future attacks. Researchers at AT&T also noted how the number of ransomware attacks increased significantly, with as many as 1.5 million new attacks occurring between 2013 and 2015.

Continue reading

4 web designing factors that weigh your website's trustworthiness

trust

Trustworthiness is one of the factors that play a huge role in converting your leads. Would you like to make a transaction with a shabby looking website? Would you trust any random xyz website over World Wide Web? Definitely not! And you should not too, in order to stay safe and secure.

So what exactly determines a website’s trustworthiness? How do customers get that feeling of authenticity and reliability for a website? Well, we do have the answers to these questions.

Continue reading

Major websites are vulnerable to advanced bots

Google finds security questions are crap because your answers are fake

Pretty much every top website, in retail, financial services, consumer services, OTA members (Online Trust Alliance), news and media, and top US government agencies, is vulnerable to advanced bots, new research says.

Bot detection and mitigation company Distil Networks, analyzed 1,000 top websites in these verticals, and how they behave against crude, simple, evasive and advanced bots. All of the verticals performed quite well against crude bots, (75 percent in consumer services, 70 percent in government, 65 percent in financial services, 64 percent in news and media, 78 percent in retail and 67 percent in OTA members), but when it comes to advanced bots, one percent is the best result found.

Continue reading

IT vs security pros: Handling appsec

pixel padlock

A new report into corporate app security, conducted by runtime application security visibility and protection company Prevoty, shows significant discrepancies between IT and security professionals, when it comes to app security.

The report, entitled "The Real Root Cause of Breaches -- Security and IT Pros at Odds Over AppSec", is based on a poll of more than 1,000 IT and security professionals and says there are major divides in how these two groups handle app updates, app security tuning and backlogging.

Continue reading

EMEA businesses too slow to detect a data breach

snail

It takes businesses in the EMEA region (Europe, Middle East, Africa) three times longer than businesses elsewhere in the world to detect a breach, mostly because they’re forced to detect such hits themselves instead of relying on outside help.

Those are the general conclusions of the first Mandiant M-Trends EMEA Report. The report, released by security experts FireEye, is based upon the statistics collected during investigations in the region, done by Mandiant’s leading consultants in 2015.

Continue reading

UK businesses lose over £1 billion thanks to cybercrime

Money Black Hole Drain

New figures released by Get Safe Online and Action Fraud, the UK’s national fraud and cyber crime reporting center, reveal the cybercrime cost for British businesses over in the last year.

In total, businesses reported £1,079,447,765 in loses as a result of cybercrime, which is a 22 percent increase from the previous year. Each police force in the UK recorded around £19.5 million in losses but this number may in fact be slightly higher as some businesses may not have reported or disclosed the full extent of the losses they incurred to the authorities.

Continue reading

Symantec buys Blue Coat Systems

Symantec logo sign

Symantec has decided to purchase Blue Coat Systems for $4.65 billion in a move that will allow it to more thoroughly protect its users from a variety of threats online.

The deal will also see Blue Coat’s CEO, Greg Clark, become Symantec’s new CEO. This will help the company fill the role which has been vacant since its previous chief executive, Michael brown stepped down in April due to poor financial results.

Continue reading

Internet of Things devices are NSA's latest target

nsa

The Internet of Things (IoT) may be the US National Security Agency’s next potential target for spying and collecting data according to a comment made by its deputy director at a recent military technology conference.

During the conference, which was held in Washington DC on June 10, deputy director of the NSA Richard Ledgett said that the agency is considering potential ways it could collect data from internet-connected devices such as smart appliances and pacemakers.

Continue reading

Microsoft sells 1.1 million Surface units in Q1 2016

surface_pro_4_trade_in

Two-in-one and pro slate devices have earned their vendors higher revenue, managing to stabilize average selling prices, a new report by Strategy Analytics says.

The report, entitled "Global Tablet Vendor & OS, Unit & Value Market Share by Region: Q1 2016", says Microsoft and Apple sold more than a million of their pro slates last quarter.

Continue reading

IT pros: Cloud apps are as secure as their on-premise counterparts

Security

For the first time ever, the majority of cybersecurity professionals believe cloud-based apps are as secure as on-premise apps. Those are the results of a new survey conducted by Bitglass, among 2,200 cybersecurity experts.

According to the report, entitled The Rise of Purpose-Built Cloud Security, 52 percent of those surveyed said they found cloud-based apps as secure as their on-premise counterparts. The most interesting thing is that this percentage has jumped from 40 percent same time last year.

Continue reading

Dell launches new PowerEdge servers

Dell Logo Sign

Dell has announced that it has upgraded its 13th generation PowerEdge four-socket server portfolio. The new servers, designed with big-data and real-time analytics in mind, offer more flexibility, scalability and manageability.

This includes four new offerings: the PowerEdge R830 and PowerEdge R930 servers, PowerEdge FC830 -- a full-width, four-socket compute node for the Dell PowerEdge FX architecture -- and PowerEdge M830 blade server.

Continue reading

Two in three commercial apps with open source code have security vulnerabilities

open source

"If you’re using open source, chances are you are likely including vulnerabilities known to the world at large". This is a quote taken from the latest open source security report released by software company Black Duck.

The company analyzed more than 200 applications that are based on, or partially use, open source material, over a six-month period. The results are that 67 percent of them have vulnerabilities, and every application has at least five vulnerable components.

Continue reading

Cisco: Internet traffic will triple by 2020

buisness growth graph

According to Cisco’s recently released annual Visual Networking Index (VNI) Complete Forecast for 2015 to 2020, global IP traffic will almost triple at a compound annual growth rate of 22 percent over the course of the next five years.

A large part of this growth in IP traffic will be caused by the one billion new users that will join the global Internet community during that time. Currently there are three billion users on the Internet but by 2020 this number will grow to 4.1 billion.

Continue reading

Many UK workers don't know what ransomware is

confusedpw

It seems all that talk by security experts how employee education is the best way to protect a business from a cyber-attack has fallen on deaf ears.

A new study by ISACA, based on a poll of 2,000 UK consumers, says that more than half of those haven’t gotten any cyber-security awareness training, at all.

Continue reading

Three in four apps do not meet GDPR requirements

iPhone in Red leather case held in left hand, tapped on the screen

Using cloud apps in a business environment, be it Shadow IT or not, is going to be risky business in a couple of years, as a vast majority of today’s widely used apps do not comply with the upcoming rules and regulations of the EU GDPR.

GDPR, or general data protection regulation, is a EU-crafted document aimed at regulating the corporate use of data, and how businesses must act in order to ensure maximum safety of customer data used, as well as privacy. It will come into force in less than two years.

Continue reading

Load More Articles