Articles about Security

Complexity is an obstacle to effective security tools

Cloud maze complexity

Although IT operations personnel often help influence the selection of cyber security tools, nearly two out of three say complexity is one of the biggest hindrances in their effectiveness.

The study by privileged access management company Thycotic shows complexity in deployment is cited by30 percent and complexity in daily use by 34 percent.

Continue reading

Digital transformation increases risk of cyberattacks

digital transformation

The drive to digital transformation is exposing companies to higher and more costly cyber risks according to a new study of over 1,300 businesses.

The study from research firm ESI ThoughtLab, together with a cross-industry coalition of organizations, including HP, KnowBe4, Opus and others, shows that cyber risks rise dramatically as companies embrace new technologies, adopt open platforms, and tap into the ecosystems of partners and suppliers.

Continue reading

New technology helps businesses to assess cyber risks

Risk dial

In a world of digital transformation projects that increasingly mean more links to suppliers and partners, it can be hard for companies to assess the risk presented by opening up their data to third-parties.

To address this problem RiskRecon is launching new asset valuation algorithms that automatically determine the inherent risk value of any internet facing system.

Continue reading

Cyberattacks shift their focus onto business in third quarter

Cyber attack

After a relatively quiet first half of the year, cyberattacks have come back with a bang in the third quarter according to the latest report from Malwarebytes.

Businesses seem to have become the main focus of attacks, experiencing more cybercriminal activity this quarter, with detections up by 55 percent, while consumer detections increased by only four percent over the last quarter.

Continue reading

Malicious messages are locking up PlayStation 4 consoles

PlayStation 4 controller

We've heard of problems with specially-crafted messages being used to lock up iPhones, and now a similar problem has been found with the PlayStation 4. Anyone who receives one of these messages will find that their console completely locks up -- and the only way out of it is to perform a factory reset.

The problem lies in messages that include unrecognized characters, and it is being exploited by some gamers to boot people offline in the middle of games -- Rainbow Six in particular. While there is no fix available at the moment, there are steps you can take to prevent the issue affecting you.

Continue reading

UK government launches guidance to help secure IoT devices

Internet of things

There are expected to be more than 420 million internet connected devices in use across the UK within the next three years and if poorly secured these can leave people exposed to security issues and even large scale cyberattacks.

To address this, a new voluntary Code of Practice is being launched by the UK government to help manufacturers boost the security of internet-connected devices such as smartwatches, virtual assistants and toys.

Continue reading

How to see if you were affected by the huge Facebook hack

Facebook hack check

The most recent Facebook security issue is one of the most serious yet for users of the social network. Depending on which numbers you are look at, the hackers who exploited a security flaw have impacted on anything between 14 and 30 million people.

Facebook is still -- with the help of law enforcement agencies -- investigating the incident, and in the meantime many people feel as those they are being left in the dark. If you want to find out if your account has been affected, here's what you need to do.

Continue reading

Facebook says hackers accessed highly-detailed personal data of 15 million users

Facebook on iPhone

In a news release with the bizarrely vague title of "An Update on the Security Issue", Facebook has revealed that the "View As" security breach it opened up about recently gave hackers access to the personal details of 15  million users.

Having previously advised that the access tokens stolen by hackers had not been used to infiltrate other apps and services, the social networking giant now says 15 million people have had their names and contact details exposed. 14 million users had significantly more details revealed, including username, relationship status, religion, hometown,  birthdate, places they have checked into, and recent searches.

Continue reading

Businesses risk penalties by not wiping data from old equipment

Wiping data

New research from IT procurement company Probrand shows that 68 percent of UK businesses have failed to wipe the data from IT equipment before disposal, leaving them open to fines under GDPR if data is exposed.

In addition 70 percent admit to not having an official process or protocol for disposing of obsolete IT equipment.

Continue reading

Should businesses prepare for ransomware with a cryptocurrency stash? [Q&A]

ransomware key

An increasing number of enterprises are considering pre-purchasing cryptocurrency in anticipation of potential ransomware attacks. But is this a valid risk-reduction strategy for enterprises?

To get some views on this controversial issue, we spoke with Mike Doran, senior security consultant with the enterprise incident management team at cybersecurity specialist Optiv, and former computer forensics examiner with the St. Louis Metropolitan Police Department.

Continue reading

Two out of three worry about identity theft but half still engage in risky behavior

identity theft

A new survey from identity management specialist SailPoint in conjunction with US National Cybersecurity Awareness Month finds two out of three professionals are extremely concerned about their personal identity being stolen.

Yet despite this half admit that they would participate in the types of risky behavior that increase the threat of leaked information and a potential breach.

Continue reading

Hackers, geeks and thieves -- analysis of dark web communities reveals varied motives

cyber criminal

When we talk about the dark web it's easy to think of it as an amorphous malevolent blob. But new research from Recorded Future reveals some key differences between dark web communities in different parts of the world.

The company's Inskit Group of researchers has actively analyzed underground markets and forums tailored to Russian and Chinese audiences over the past year and has discovered a number of differences in content hosted on forums, as well as differences in forum organization and conduct.

Continue reading

Carbon Black launches advanced threat hunting from the cloud

Insider threats

Most endpoint detection tools collect only a limited set of data, which can make it hard for teams to track down and combat threats.

To address this issue, endpoint security specialist Carbon Black is launching a new threat hunting tool as part of its Predictive Security Cloud (PSC).

Continue reading

68 percent of enterprises are not ready to cope with DNS attacks

DNS

A new study reveals that 68 percent of the top 50 companies on the Fortune 500 rankings are not adequately prepared for the next major DNS attack.

The Global DNS Performance Report by network intelligence company ThousandEyes shows that DNS best practices are not widespread in major enterprises and SaaS providers, leaving them needlessly vulnerable.

Continue reading

Symantec delivers integrated approach to cloud security

cloud security

Companies increasingly rely on cloud applications and infrastructure for their critical systems. Protecting these is vital and to help businesses do so, Symantec  is launching an expansion to its cloud security portfolio.

Symantec’s Cyber Defense Platform offers a broad range of protection, providing visibility and control for virtually any cloud app and integrations with CloudSOC CASB, Cloud Workload Protection (CWP) and Data Loss Protection (DLP).

Continue reading

© 1998-2018 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.