Since the onset of the COVID-19 crisis earlier this year 80 percent of companies have seen 'slightly to considerably more' cyberattack attempts, breaking down to 88 percent in the US and 74 percent in the UK.
SIEM specialist Exabeam surveyed more that 1,000 IT security professionals at small- to medium-sized enterprises and finds that a third of respondents experienced a successful cyberattack during COVID-19, leading to network downtime for 40 percent of UK companies and 38 percent of US companies.
The use of microservices is succeeding for 92 percent of organizations according to new research from learning resources company O'Reilly.
It surveyed over 1,500 software engineers, systems and technical architects, engineers, and decision-makers from around the globe and finds that 77 percent of respondents have adopted microservices.
Mozilla has released Thunderbird 78.0 for Windows, Mac and Linux. It’s the first major update of the popular open-source email client since August 2019, and is only available as a direct download -- existing users of the Thunderbird 68.x series are advised to wait for a future release that will provide an upgrade path.
A host of new and changed features have been implemented, although the long-heralded built-in support for OpenPGP encryption has been disabled by default for now due to some outstanding issues.
Researchers at Check Point have been working with Zoom to to fix a security issue that would have allowed hackers to manipulate organizations’ customizable Zoom 'Vanity URLs'.
The vulnerability would allow attackers to send legitimate-looking meeting invitations, with the aim of inserting malware and stealing data or credentials from unsuspecting victims.
Microsoft's track record with updates for Windows has been a little wobbly of late, with many updates introducing problems, or creating more issues than they fix. But it seems that it is not just the famous operating system that is jinxed -- Outlook is too.
Following reports from users that the Outlook desktop app was crashing with a 0xc0000005 error, Microsoft launched an investigation. While the company is now in the processing of pushing out a fix, a workaround has been shared online for those affected.
Overnight, Twitter suffered a massive attack by hackers who tried to use the verified accounts of celebrities and high-profile users to execute a Bitcoin scam. The likes of Barack Obama, Joe Biden, Elon Musk, Bill Gates and Kanye West had their accounts hijacked and message were posted promising that if people sent money to a Bitcoin wallet, they would get double the amount back.
Needless to say, it was a crypto scam, and Twitter took the extraordinary steps of preventing all users with a blue tick from tweeting. Twitter now has control of the situation and says that the attack came after staff fell victim to social engineering, enabling hackers to gain access to internal tools which were then used to take over key accounts.
Another day, another solid state drive. Yes, folks, we are once again telling you about a new SSD. There sure are a lot of new models hitting the market lately, right? This time, the drive is from Silicon Power. We recently reviewed one of that company's external SSDs, but I digress.
Called "UD70," it is a PCIe 3.0 SSD that uses 3D QLC NAND. Unfortunately, it is not a PCIe 4.0 drive like the company's similarly named US70. While a PCIe Gen 3x4 SSD is nothing out of the ordinary, Silicon Power boasts about it having superior cooling capabilities. No, it doesn't have a huge heatsink. In fact, it has no heatsink at all. Actually, SP says the cooling capabilities are baked into the UD70's firmware.
Yesterday, Microsoft rolled out a new Windows 10 Build to the Beta Channel (what used to be the Slow ring) and today the software giant follows that up with a new flight on the Dev Channel (previously the Fast ring).
Build 20170 introduces a couple of new features, but won’t be offered to Insiders running PCs with AMD processors due to a bug affecting overall usability.
Despite the devastating recent outbreak of the novel coronavirus, phishing attacks continue to drag us and our businesses down. So how exactly do COVID-19 related phishing attacks work?
Cybercriminals have taken it upon themselves to wreak havoc and feed off the fears people have about the virus. Emails are being sent that ask their targets to open attachments containing information about the latest coronavirus statistics or news. Or, they claim to be from legitimate companies offering information about COVID-19.
The advent of quantum computers will render ECC and RSA encryption algorithms obsolete, requiring companies to migrate their computing systems and PKI infrastructure to new, quantum-safe cryptographic algorithms.
This migration of PKI solutions to quantum-safe crypto algorithms will pose many major challenges for many enterprises. All existing applications and systems will need to be updated to support the new quantum-safe algorithms now being developed in response to the threats posed by quantum computers. The process of updating to new algorithms requires significant engineering work and many systems will require extensive updates.
Let’s start with the definition of "REPLACE," from Merriam-Webster: To restore to a former place or position (e.g. replace cards in a file); To take the place of especially as a substitute or successor; To put something new in the place of (e.g. replace a worn carpet).
Now, let’s check the definition of "ENHANCE": To increase or improve in value, quality, desirability, or attractiveness (e.g. enhanced the room with crown molding); To increase or improve (something); To make greater or better (e.g. the products claim to enhance beauty).
As California Consumer Privacy Act (CCPA) enforcement officially started July 1, affected enterprises (based on size, California customer base and business type) can no longer delay complying with the new law. CCPA grants California residents an array of new rights, starting with the right to be informed about what kinds of personal data companies have collected and why it was collected.
A June 2020 survey found that more than 20 percent of organizations were either somewhat unlikely to be, very unlikely to be, or didn't know if they would be fully compliant with CCPA by July 1. With only 14 percent of respondents CCPA compliant and nearly one-third of organizations just starting to plan for CCPA, enterprises need to be prepared for enforcement sooner than later to uphold the rights of California consumers and avoid non-compliance penalties, which can reach up to $7,500 per violation.
The coronavirus crisis has led to many changes in working patterns. But what's its effect on the longer term strategies of businesses?
Cloud communications platform Twilio surveyed over 2,500 enterprise decision makers globally to gauge the effect of the pandemic on their companies' digital transformation and communication roadmaps.
An unprotected database belonging to the VPN service UFO VPN was exposed online for more than two weeks. Contained within the database were more than 20 million logs including user passwords stored in plain text.
User of both UFO VPN free and paid services are affected by the data breach which was discovered by the security research team at Comparitech. Despite the Hong Kong-based VPN provider claiming to have a "strict no-logs policy" and that any data collected is anonymized, Comparitech says that "based on the contents of the database, users' information does not appear to be anonymous at all".
Organizations often rush into cloud deployments without fully appreciating all of the risks that they can present.
A new report from cybersecurity advisory and assessment services firm Coalfire identifies key considerations, common pitfalls, and practical advice for professionals who have responsibility for enterprise cloud strategy, planning, adoption, and operations.