Articles about Security

Hackers can disable your car's safety systems

Hacking Inner Car Systems

Hackers could disable a modern car's airbags and other safety systems, putting the driver and the passengers at grave risk, according to a new warning.

Researchers from security firm Trend Micro have revealed a flaw that could allow the controlling network of a connected car to be overloaded, allowing possible hackers to compromise key systems in the vehicle, including safety aspects.

Continue reading

How network segmentation can help contain cyber attacks

virus spreading network devices nodes connected Internet of Things malware hacked bot

Cyber crime continues to be a major problem globally and companies are seeking new ways of combating it.

However, there are some older technologies that remain an effective defense. One of these is network segmentation, and network security specialist Tufin Technologies has produced an infographic explaining how segmentation works and how it can help keep organizations secure from today’s sophisticated cyber attacks.

Continue reading

Data leak exposes 1.8 million US voters' private information

open digital lock

A supplier of US voting machines has confirmed a major data leak that has seen the details of more than 1.8 million voters in the state of Illinois exposed.

The leaked data includes full names, addresses, dates of birth, social security numbers (albeit partial), as well as party affiliations. In some cases even ID numbers and driver license numbers were exposed.

Continue reading

Hackers share HBO social media passwords and threaten to leak Game of Thrones S07E07


A few days ago, HBO's latest humiliation was to have its social media accounts taken over by hackers, and the bad news just keeps on coming for the network. The "Mr Smith group" behind the huge data breach that has seen endless Game of Thrones leaks contacted Mashable with the login details for many HBO social media accounts.

On top of this, the group is also threatening to release Game of Thrones S07E07 -- but considering the number of episodes that have leaked from this season, this was to be expected.

Continue reading

IT professionals need more security training for DevOps


New research has revealed that software developers are not receiving the training necessary to be successful at DevOps in their current positions.

According to the 2017 DevSecOps Global Skills Survey sponsored by Veracode and, 65 percent of DevOps professionals believe that knowledge of DevOps is essential when starting a career in IT. However, 70 percent believe that they did not receive the necessary training through formal education to be successful in today's DevSecOps world, which integrates security into the development and testing of software.

Continue reading

Kaspersky Secure Connection VPN service is free, but Android users aren't happy with the permissions it requires


In a time when people are more concerned about privacy than ever, security tools such as VPNs are proving increasingly popular. Kaspersky Lab recently released a VPN tool for Android, and reviewers are voicing concerns about the permissions required by the app.

Kaspersky Secure Connection: VPN service has a reasonable overall review score at time of writing, but the lower scores are highly critical of what are seen as privacy-invading permission requirements.

Continue reading

Push authentication can replace the password

enterprise security login authentication verification user password

For a vestige of the past, the password has managed to hold on and remain alive -- even though some of the top people in computing said that it had already died over a decade ago. In one of his more famous predictions, Microsoft founder Bill Gates said that passwords were on the way out already in 2004. Problem is that Gates, for all his wisdom, didn’t tell us what to use to replace passwords.

"There is no doubt that over time, people are going to rely less and less on passwords," Gates said at the RSA conference in 2004. "People use the same password on different systems, they write them down and they just don't meet the challenge for anything you really want to secure." How prescient he was, it turns out. There were hackers back in 2004, but hacking was nothing like the major international industry it is today -- responsible for tens of billions in losses every year, and endangering businesses large and small.

Continue reading

Ransomware attacks almost double in first half of 2017


The percentage of ransomware attacks almost doubled in the first half of 2017 compared to the first half of 2016, from an average of 26 percent to an average of 48 percent of the main attack categories worldwide.

This is according to a mid-year cyber attack trends report from threat prevention company Check Point. It also finds that 23.5 percent of organizations were impacted by the RoughTed malvertising campaign, and 19.7 percent of organizations were impacted by the Fireball malware over the same period.

Continue reading

PowerPoint vulnerability enables malware spreading

virus spreading network devices nodes connected Internet of Things malware hacked bot

Researchers have discovered that cyber attackers are exploiting a vulnerability that allows them to elude antivirus software to deliver malware via Microsoft PowerPoint.

The flaw itself exists in the Windows Object Linking and Embedding (OLE) interface and attackers have previously used it to deliver infected Rich Text File (.RTF) documents. Trend Micro's researchers noticed that attackers have now infected PowerPoint files to deliver malicious code.

Continue reading

72 percent of security pros say encryption backdoors won't stop terrorism


A new survey of information security professionals carried out at last month's Black Hat conference suggests that the majority think encryption backdoors are ineffective and potentially dangerous.

The study carried out by machine identity protection company Venafi finds that 72 percent of respondents don't believe encryption backdoors would make their nations safer from terrorists.

Continue reading

Malware attacks rising thanks to leaked exploits


Malware threats have reached dangerously high levels, according to a new report that highlights the sheer scale of threats facing businesses today.

The latest Kaspersky Lab Malware report, covering the three months of Q2 2017, claims that Kaspersky Lab's products blocked more than five million attacks involving exploits in this time period.

Continue reading

AWS Macie is a security service based on machine learning

Amazon AWS

Amazon Web Services has launched a new machine learning service aimed at helping organizations protect their sensitive data in the cloud.

Macie's general premise is quite simple: it analyzes data on the S3 storage service, and is capable of identifying names, addresses, credit card numbers, driver licenses or social security numbers, stuff like that.

Continue reading

On-premises workloads have more security incidents than those in the public cloud

Cloud data security

According to a new survey, workloads run on in-house systems suffer 51 percent more security incidents than those on public cloud services.

The study from cloud security and compliance company Alert Logic analyzed more 2 million security incidents captured by its intrusion detection systems over 18 months.

Continue reading

Enterprises still struggle with password policies

Password key image

Passwords and their effectiveness is a subject that continues to come under the spotlight, particularly with the publication of a recent United States National Institute for Standards and Technology (NIST) document recommending a move to passphrases.

Security awareness training specialist KnowBe4 has carried out a survey of 2,600 IT professionals to look at how organizations are managing passwords and determine how the proposed passphrase concept stacks up against methods currently in use.

Continue reading

Researchers hack a computer using malware injected into DNA


Security researchers have managed to infect a computer with malware embedded in a strand of human DNA.

The news sounds like a science-fiction writer's dream, but when biologists want to handle large amounts of DNA samples, they need to digitize them and process them on their computers. But the software that they use to process these samples is usually open-source and often doesn't follow security best practices.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.