Microsoft's enterprise security software now offers PUA protection

black_microsoft_logo

Microsoft has started to offer potentially unwanted application (PUA) protection in its anti-malware products for enterprise firms.

The news means that businesses will finally have an easy way of removing adware, browser hijackers and any other piece of software that deploys programs without the user’s knowledge or consent.

Continue reading

Technology terror: How ad-blocking technology steals ad dollars and video views

scared frighten fear cat

Freddy Krueger. Jason Voorhees. Michael Myers. Ad Blocking Technology. If you’ve watched a horror movie in the past 20 years, you’ve no doubt heard of those first three gruesome monsters. The last term may not be as familiar to you, but it is becoming a boogeyman of sorts for streaming video -- both for those who create and provide it as well as those who consume it.

Ad-blocking software and technology has become a very serious concern for programers, video creators, and publishers in 2015. Before the year is over, an estimated $3 billion dollars in video ad payload will be lost by publishers because of ad-blocking technology. Some premium video authors estimate that as much as one third of their video content isn’t reaching their streaming audiences at all. It may not be an epidemic yet, but there clearly is a trend, as ad-supported video businesses are being challenged as consumers install ad blockers at an increasing rate, especially on their mobile devices where they engage with video the most.

Continue reading

Some VPN services might expose your IP address

Virtual Private Network VPN

Just because you’re hiding behind a VPN (virtual private network), it doesn’t mean your real IP address cannot be traced. Those are the results summarised in a report by security firm Perfect Privacy, which says that it has found a vulnerability "in a number of providers".

The flaw, described as "port fail", affects virtual private network providers which offer port forwarding and do not have appropriate protection against the vulnerability.

Continue reading

How to securely manage the Windows 10 devices in your network

windows_10_bubble

Microsoft’s decision to make Windows 10 a free upgrade means that, according to industry analysts, more than 350 million Windows machines are expected to be on Windows 10 within the next 12 months. This can create a huge gap between enterprise IT teams and employee devices.

While "free" has accelerated the adoption of Windows 10, what truly sets this release apart from others is that Microsoft plans to expand Windows 10 to an unlimited number of devices via the Internet of Things (IoT). IoT is becoming an increasing topic of conversation both in and outside of the workplace, in particular in discussions around how to secure these connected devices.

Continue reading

Raspberry Pi generates predictable SSH keys

Raspberry Pi 2 Model B

The ultra-cheap Raspberry Pi computers have a security flaw which results in the devices generating a weak and predictable SSH key, new research suggests. The researchers say the computer’s operating system, Raspbian, should be patched to avoid the flaw.

"As soon as the systems start up systemd-random-seed tries to seed /dev/urandom, but /var/lib/systemd/random-seed is missing, because it hasn’t been created yet", explains the developer oittaa.

Continue reading

The security risks of IoT devices

Internet of Things IoT

The Internet of Things (IoT) isn’t a new concept, but it has gained momentum especially within the last year, as more and more connected devices have come to market. While connecting everything brings added convenience to our everyday lives, it’s crucial to understand what we may be compromising from a security perspective, and importantly, which devices could pose a threat either now or in the future.

With so many connected devices we decided to take a look at those that have made the headlines so far this year. Cars, for instance, have only recently become connected, although they have long been computerized. However, with poor Internet security expertise some manufacturers are being caught out.

Continue reading

Is your network ready for IoT devices?

Internet of things

The stats are here: investment bank Goldman Sachs cites the Internet of Things as a $7 trillion opportunity by 2020 -- with IoT set to have an impact at every stage in the production and distribution of products.

Wikibon predicts the value of efficiency savings from machine data alone could reach close to $1.3 trillion and will drive $514 billion in IT spend by 2020. Manish Sablok, head of Field Marketing, North West and East Europe at ALE, looks at the four fundamental network requirements to enable businesses to take full advantage of the transformations that IoT will drive.

Continue reading

How to keep your mobile data safe

Security Lock Circuit

Every month we see another story hit the headlines of how a household name has lost customer data. These type of incidents can cost millions to put right, not just in updating the IT systems, but in terms of lost revenue due to loss of good reputation, and potentially punitive fines.

When the new EU General Data Protection Regulation (GDPR) comes into force, expected during 2017, fines for non-compliance could be five percent of global turnover. This is a significant sum for any size of organization and deserves serious consideration.

Continue reading

Taking enterprise security to the next level with two-factor authentication

Smartphone lock unlocked key

Two-factor authentication (2FA) has been about for much longer than you think. For a decade or more we have been used to being issued with a card reader (in essence a hardware token device) to use with our bank card and Personal Identification Number (PIN) when looking to complete our internet banking transactions.

2FA technology has also, over the past years, been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice.

Continue reading

Security breaches don't lead to a change in IT policy

Cyber attack

A survey conducted by training company QA, reveals that eight out of ten (81 percent) UK IT decision makers experienced some sort of data or cyber security breach in their organization in 2015. Sixty-six percent said that the breach had led to a loss of data, 45 percent said that it had resulted in a loss of revenue, and 42 percent said that it had resulted in a PR nightmare for the business.

Despite this, however, less than a third (27 percent) plan to invest in cyber security technologies next year. It would also appear that not all organizations have learnt from their experience, with less than half (43 percent) of IT decision makers saying that the breach had not resulted in a change of policy and procedure.

Continue reading

Samsung's first 128 GB DDR4 RAM modules for servers go into production

Samsung 128GB RAM

Samsung has announced that it is starting mass production of the industry’s first "through silicon via" (TSV) 128GB DDR4 memory modules for high-end enterprise and data centre servers.

This news follows on from its successful introduction of the 64GB 3D TSV DDR4 DRAM last year, which was an industry first.

Continue reading

Lenovo fixes two security vulnerabilities in its preloaded Windows tools

encryption_padlock

Lenovo has issued a patch which fixes vulnerabilities located in the software which comes preloaded with some of the laptops it sells.

The company recently released version 5.07.0019 of Lenovo System Update. This tool is made to keep the BIOS and drivers updated, previously called ThinkVantage System Update.

Continue reading

Combating insider threats: The pillars of an effective program

insider threat

Insider threats can be the most dangerous threats to an organization -- and they’re difficult to detect through standard information security methods. That’s partially because the majority of employees unknowingly pose a risk while performing their regular business activities.

According to data we collected from analyzing the behaviors of more than a million insiders across organizations, in approximately 90 percent of data loss prevention incidents, the employees are legitimate users who innocently send out data for business purposes. They are exhibiting normal behavior to their peers and department, even though it might be in violation of the established business policy and a significant risk to their employer.

Continue reading

Dell announces Datacenter Scalable Solutions server line

servers cloud

In an effort to expand its share of the server market, Dell has announced today that it will be launching a new line of servers targeting companies that do not require the server volume of a hyperscale data center.

Instead, Dell will be catering to companies involved in web technology, telecommunications, hosting, utilities such as oil and gas, and research institutions. Dell hopes to meet the unique needs of companies in these fields with its Datacenter Scalable Solutions (DDS) units.

Continue reading

Post Deletion Stress Disorder: Is it real?

Delete button

A recent study, which asked 1,000 UK consumers about their digital device habits, has revealed that more than half of them (56 percent) delete things from their devices to make room for something else, and then regret doing so.

The move is called Post Deletion Stress Disorder and, according to a press release from the study’s maker WD, is only set to continue.

Continue reading

Load More Articles