Articles about cybersecurity

Nearly half don't use mobile security solutions

A new report from Bitdefender shows that 45 percent of consumers don't use mobile security solutions, despite the fact that 78 percent conduct sensitive transactions on their devices.

Based on an independent global survey of over 7,000 consumers, the report looks at top security behaviors, practices and concerns across their digital footprint and lifestyle.

Continue reading

Firewalla launches protection for Wi-Fi 7 networks

The introduction of Wi-Fi 7 -- IEEE 802.11be to its friends -- marks a step forward in wireless speeds to cope with the five and 10 gigabit capabilities of fiber networks.

Of course your security needs to keep up with these speeds too and that's why Firewalla is launching its Gold Pro 10-gigabit smart firewall.

Continue reading

Keeper Security introduces passkey support for mobiles

Passkeys, cryptographic keys that lets users log in to accounts and apps without entering a password, have been around for a while but mostly on computers.

Now though Keeper Security has introduced passkey management support for both both Android and iOS mobile devices.

Continue reading

Malicious QR codes hide attacks in plain sight [Q&A]

QR code scan

With their ability to provide access to websites, enable mobile payments, and retrieve data, QR (quick-response) codes have become a ubiquitous part of our daily lives. In fact, In 2022, approximately 89 million smartphone users in the United States scanned a QR code on their mobile devices, a 26 percent increase compared to 2020.

However, cybercriminals are also using this trend to distribute malware, steal personal information, and conduct phishing attacks, which can then be leveraged to access your confidential corporate data. As consumers and even large enterprises continue to use QR codes as a means to streamline operations, it's important to be aware of the fast-growing attack surface that bad actors are jumping on.

Continue reading

Malwarebytes adds AI to its business security offering

AI security

Malwarebytes is adding an AI feature to its Security Advisor, part of the ThreatDown tool aimed at helping IT teams make better use of their resources.

Using generative AI technology, the new capabilities transform Security Advisor into a dynamic experience that allows customers to use simple natural language requests to search for information about their environment, ask for recommendations on how to optimize their security posture, automatically implement updates, and more.

Continue reading

Businesses still not ready for new DMARC rules

Despite them being widely publicized, Google and Yahoo's new email rules still risk catching out many businesses.

New research from EasyDMARC finds that, despite the email providers warning customers that failure to implement the DMARC security standard could lead to diminishing email deliverability, only 37 percent of IT decision-makers have rolled out the security measure.

Continue reading

More than 17 billion records compromised in 2023

Last year saw a 34.5 percent year-on-year increase in reported data breach incidents, with over 17 billion records compromised according to a new report from Flashpoint.

This trend looks set to continue as the first two months of 2024 alone saw a massive 429 percent spike in stolen or leaked personal data compared to the same period in the previous year.

Continue reading

More than half of organizations fall victim to cyberattacks

Cyber attack

The latest Cybersecurity Readiness Index from Cisco shows that 53 percent of the respondents report falling victim to a cyber incident this past year, and many leaders (73 percent) believe that they will be a victim of a cybersecurity incident in the next 12-24 months.

The report shows that the level of readiness is down on a year ago too. Only three percent of organizations around the globe have a mature enough security posture to protect against today’s threats (down 12 percent compared to last year).

Continue reading

Enterprise cybersecurity's lateral movement 'blind spot' [Q&A]

Network

A lot of time, attention, and investment is spent on creating strong perimeters and endpoint defenses to prevent malicious actors from gaining access to corporate networks.

While this is important, organizations also need a network security strategy -- because if attackers do infiltrate a network, the race is on to uncover the malicious activity and quickly resolve the incident.

Continue reading

Generation Z is becoming generation fraud

Robot hacker

Members of generation Z -- those born in the mid to late 1990s -- are more susceptible to fraud than other age groups and are also committing it at a higher rate.

The latest Digital Trust and Safety Index, released today by Sift, shows that 33 percent of Gen Z survey respondents know someone who has, or have personally, participated in payment fraud, compared to only 10 percent of Baby Boomers.

Continue reading

61 percent of breaches involve infostealer malware

A rise in identity-based attacks can be laid at the door of a rapid increase in malware, according to a new report. Analysis by SpyCloud finds that 61 percent of data breaches in 2023, involving over 343 million stolen credentials, were infostealer malware-related.

Researchers also report that the average identity had a one in five chance of already being the victim of an infostealer infection. Infostealer malware enables criminals to collect vast amounts of information about the user and the device, including a user's session cookies, API keys and webhooks, crypto wallet addresses, and more.

Continue reading

Syncing of cloud passwords opens businesses to cyberattacks

A new report reveals that 67 percent of businesses routinely synchronize most of their users’ passwords from their on-premises directories to their cloud counterparts. This poses substantial security risks by creating a gateway for attackers to hack these environments from on-prem settings.

The report from Silverfort shows that in the rush to the cloud security gaps stemming from legacy infrastructure, misconfigurations, and insecure built-in features create pathways for attackers to access the cloud, significantly weakening a company's resilience to identity threats.

Continue reading

IT leaders struggle to keep up with emerging threats

A new report shows that 95 percent of IT leaders say that cyberattacks are more sophisticated than ever and they are unprepared for this new wave of threat vectors.

The survey, of more than 800 IT and security leaders around the world, from Keeper Security reveals that firms are witnessing AI-powered attacks (51 percent), deepfake technology and supply chain attacks (both 36 percent), cloud jacking (35 percent), Internet of Things (IoT) attacks and 5G network exploits (both 34 percent), and fileless attacks (24 percent).

Continue reading

Preparing for a post-quantum security landscape [Q&A]

As widely available quantum computing draws closer, organizations need to consider the extent to which their supply chain presents risks and start building in post quantum readiness to their risk assessments.

To do this, it's critical for businesses to understand the origin and authenticity of all the components that are in the supply chain (both hardware and software). This is especially true for IoT devices, which rely on systems and subsystems created by multiple partners and vendors bringing their solutions together to make a fully functioning connected product/system.

Continue reading

Third-party breaches create network weak spots

Network security

A new report from Black Kite shows how third-party data breaches create critical weak spots in extended networks, potentially leaving businesses open to cyber attacks, which can have a negative ripple effect across the organization and its stakeholders.

The report is based on analysis of 81 vendor breaches impacting 251 companies in 2023. Unauthorized network access was the leading cause of breaches, accounting for over half (53 percent) of third-party breach incidents. This represents a 26 percent increase from 2022, with ransomware being the most common method of compromise.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.