Articles about Security

Free app helps consumers understand and reduce their cyber risk

SAFE Me app

Cybercrime is a major concern and many people worry about the threat of their personal data being stolen, leading to identity theft.

A new free app from cybersecurity and digital business risk quantification specialist Lucideus aims to fundamentally change the way consumers secure and protect their digital lives.

Continue reading

Get 'Mastering Linux Security and Hardening -- Second Edition' ($31.99 value) FREE for a limited time

From creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades. However, security has always been a major concern.

With limited resources available in the Linux security domain, this book will be an invaluable guide in helping you get your Linux systems properly secured.

Continue reading

Secureworks delivers businesses an alternative to SIEM

DevSecOps

In the face of rising threat levels many businesses have turned to security information and events management (SIEM), but it isn't the right approach for all.

Software-driven security specialist Secureworks is offering an alternative with improvements to its Threat Detection and Response (TDR) product. It allows security operations teams to detect, investigate and respond to security incidents.

Continue reading

Malwarebytes expands business protection for remote workers

endpoint protection

Malwarebytes has announced updates to its business protection suite and industry partnerships which incorporate more features to help secure remote workers.

New product features include the addition of Malwarebytes Brute Force Protection and Malwarebytes' next-generation scan and detection engine. The company has also announced a partnership with cyber insurance provider, Coalition to offer a combined solution of endpoint security and cyber insurance to protect organizations from cyberthreats.

Continue reading

Regular tech updates are a key factor in security success

security meter

Security teams that proactively refresh their technology regularly have then most success in fending off threats according to a new report from Cisco.

On average, programs that include a proactive, best-of-breed tech refresh strategy are 12.7 percent more likely to report overall security success. However, not all organizations have the budget or expertise to make this happen, but a strategy to migrate to cloud and SaaS security solutions can help.

Continue reading

Parcel delivery phishing scams up 400 percent in November

Researchers at Check Point have seen a 400 percent increase in phishing scams using DHL, Amazon and FedEx branding to try to get people to part with information during the peak online shopping period.

Two weeks ago, Check Point researchers documented an 80 percent increase in malicious phishing campaigns targeting online shoppers with 'special offers.' The latest spike uses subject lines like 'track your shipment' and 'delivery problem.'

Continue reading

Users underestimate level of attacks on home networks

IoT security

Internet users in the US vastly underestimate how often their home networks are targeted by cyber threats according to a new report from Comcast.

The first Xfinity Cyber Health Report combines data from a new consumer survey with threat data collected by the xFi Advanced Security platform and finds 95 percent of survey respondents underestimate the volume of attacks they face each month.

Continue reading

Zero trust access, VPN, both? The changing face of remote network access [Q&A]

Networked computers

Virtual private network (VPN), software defined perimeter (SDP), zero trust network access (ZTNA), there are plenty of technologies around for protecting remote access to enterprise networks.

This is an area that's been thrown into sharper focus this year, but what's the best option for keeping remote access secure? We spoke to Scott Gordon, CISSP for Pulse Secure to discuss the value of the different options available.

Continue reading

Employees' home networks could lead to SMEs failing security assessments

Home network

With the pandemic forcing more people to work from home, businesses in the UK -- particularly smaller ones -- may not have considered the fact that their employees' home networks now fall under the scope of regulatory and certification requirements.

According to a report from support solutions company A&O IT Group, if an individual works from home more than half of their time, their network must be compliant with current regulations.

Continue reading

How the banking sector is adapting to security and regulatory requirements [Q&A]

computer piggy bank and cash

Banks and other financial services institutions have been moving more and more towards digital in order to streamline processes and improve customer service.

The pandemic has accelerated this process but has also brought a rise in cyberattacks. Regulators have also begun to take more notice of security practices surrounding accounts. We spoke to Michael Magrath, director, global regulations and standards, at specialist in anti-fraud and digital identity solutions for financial institutions OneSpan, to discover more.

Continue reading

If you're still using Windows 7, you need to install this important, free 0-day patch

Windows 7 close up

Windows 7 may be rather long in the tooth, but there are still millions of people using it globally. And just because the operating system has been around for years, that does not mean all of the bugs and security issues have been ironed out; far from it, in fact.

Earlier this month a security researcher discovered a local privilege escalation vulnerability in both Windows 7 and Windows Server 2008 R2. There's no indication that Microsoft will issue a patch even for organizations the paid for extended support, but the vast majority of Windows 7 users will be left vulnerable. Or at least that would be case if it wasn't for 0patch stepping up to the plate and making a micropatch available for free.

Continue reading

Pirated data risks: Remote teams need to become a first line of defense

The increasing number of news headlines that mention data piracy, theft and database hacking makes it clear that businesses need to treat data as a valuable asset. This is especially true of businesses with teams that work remotely, as these set-ups usually have fewer security protocols.

Most remote workers are working from their homes, and unless those team members are conscious of cybersecurity, they’re not likely to have intrusion detection systems and firewalls on their personal networks.

Continue reading

More than 5,000 Black Friday-related scam sites registered in November

Black Friday

While the holiday season is a peak time for retailers, it also represents an opportunity for cybercriminals. This is particularly true of 2020 when more people than ever are likely to be shopping online.

Research from Comparitech analyzed around 30 million websites registered this month to identify efforts by cybercriminals to trick consumers looking for holiday shopping deals.

Continue reading

Human-centered approach is key to better security

Security

Individual behavior is an important factor in security, but according to the Information Security Forum there's a growing recognition that security awareness in isolation rarely leads to sustained behavior change.

The ISF argues that organizations need to proactively develop a robust human-centred security program to reduce the number of security incidents associated with poor security behavior and is releasing a new digest to help.

Continue reading

Privacy and security still major concerns for consumers

privacy key

Although 59 percent of consumers have accessed more online services than usual this year, they still have worries about the security and privacy of their data.

A new report from identity verification and authentication provider Onfido shows the top concerns are that data will be passed on to third parties (53 percent), the security of the information (50 percent), and asking for too much information (37 percent).

Continue reading

© 1998-2020 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.