Articles about Security

Businesses spend $2,300 to deal with a malware attack

Hackers laptops

To remedy a malware attack businesses need to shell out, on average, $2,300 per attack. This is according to a new report by Arbor Networks.

The report, produced in partnership with research organization 451 Research, says spear phishing attacks are still most successful of all the different methods of entry.

Continue reading

Russian hackers stole and sold passwords belonging to British politicians

red-hacker

An investigation by the Times has found that passwords belonging to British officials have been traded by Russian hackers. The passwords and email addresses of tens of thousands of politicians, senior police officers and diplomats were sold or swapped following an attack on LinkedIn in 2012.

As well as LinkedIn, some information seems to have been garnered from MySpace. The credentials for politicians, including education secretary Justine Greening and business secretary Greg Clark, were initially put on the market for sale or trade, but were later made available free of charge.

Continue reading

Cyber attacks and regulations don't change businesses' digital transformation plans

Digital transformation

Businesses looking to digitally transform won’t be intimidated by cyber-attacks or data protection regulations, according to a new report by Advanced.

Based on a poll of more than 500 senior executives in UK organizations, Advanced says organizations are concerned, but won’t give up.

Continue reading

Cloud-native workloads gain momentum

Cloud

A new survey shows that 18 percent of organizations now have more than half of their workloads in cloud-native environments. In addition many are moving from on-premises and self-hosting toward shared environments, distributing workloads across multiple providers.

The study by cloud security and network software firm Cohesive Networks also finds 57 percent of respondents say that cloud-native workloads make up at least 20 percent of applications in Infrastructure-as-a-Service (IaaS).

Continue reading

Virgin Media warns Super Hub 2 owners to change their passwords due to hacking risk

virgin-media

Virgin Media is urging hundreds of thousands of customers with its Super Hub 2 router to change their passwords after a Which? investigation uncovered a way for hackers to gain access to the device.

If the password for the router is not changed from its default there is a risk from hacking, but Virgin Media said the risk is small. Nevertheless, as a precautionary measure a password change is the advice for more than 800,000 users.

Continue reading

Microsoft Edge bug bounty program now permanent

Computer bug

Microsoft introduced a bug bounty program for Edge last August. Originally intended as a temporary thing, it will now live on as the software giant reports that it has lead to major improvements in its browser's security.

As is the case with bug bounty programs, part of the appeal for security researchers is the financial side. In this case, Microsoft says that it has paid over $200,000 in bounties in since it kicked off.

Continue reading

The value of information on the dark web

dark web

We're all familiar with the concept of the dark web where information gained from hacks and data breaches is traded amongst cyber criminals. But just how much are your identity and account credentials worth?

Password manager and digital vault app Keeper Security has produced an infographic looking at how much various pieces of information trade for.

Continue reading

Facebook uses India as a testing ground for profile picture protection features

facebook-profile-picture-protection

It's a common belief that anything that appears online is fair game for downloading and sharing, and this idea extends to Facebook profile pictures. Facebook has found that in India in particular there is great concern from users -- particularly woman -- about uploading a profile picture in case it is download and shared elsewhere.

Responding to this, the social network is trialling features that will grant users more control over their profile pictures. Facebook is not only introducing a new profile picture guard, but also encouraging people to add a design layer to their images to discourage misuse by others. If the trial proves successful, the feature will enjoy a wider rollout.

Continue reading

The journey from Microsoft Security Bulletin to Security Update Guides

microsoft-black-shop-logo

For decades, the Microsoft Security Bulletins have provided IT administrators with a monthly list of vulnerabilities and accompanying patches. Much to the chagrin of the IT community, these Bulletins have been replaced by the Security Update Guides portal (SUG), which many administrators believe will be a lot more work for them, especially for patch management professionals who already have enough on their plate.

Moreover, the additional time to research and understand the security patches required for their unique environments will only lengthen the time to patch. While the portal is searchable by Common Vulnerabilities and Exposures (CVE), Knowledge Base (KB) article, product or release date, the change in process will impact the daily routines of IT administrators and security professionals around the world.

Continue reading

Cisco's new network can learn, adapt and overcome security threats

Cisco

Cisco has unveiled its network of the future designed with the ability to learn, adapt and evolve to combat security threats and manage the increased load put on networks by an ever-increasing number of devices.

The company created its new network with the intent of developing an intuitive system that can anticipate actions, stop security threats and continue to evolve and learn over time. Cisco's network of the future will allow businesses to solve the challenges they face in a time of increased connectivity and distributed technology.

Continue reading

Retailers will lose $71bn due to payment fraud

Credit card hand

Retailers are facing losses of up to $71 billion globally as the number of fraudulent card-not-present (CNP) transactions rises hugely within the next five years.

A new report from Juniper Research has revealed that a number of different factors are driving the increase in fraud, including the US shifting towards EMV cards, delays in 3DS 2.0 and click-and collect fraud methods.

Continue reading

Google Play fails to catch trojan-injected apps (again)

android-google-play-apps

Getting your Android apps through Google Play is considered safe, but there are times when even the search giant's store is dangerous. Case in point, Kaspersky uncovered two more trojan-infected apps that weren't removed until they had over 60,000 installs.

Kaspersky security researcher Roman Unuchek reports that, since September 2016, he has discovered "several dozen new malicious apps" on Google Play, all of which "were rooting malware that used exploits to gain root rights on the infected device." Obviously, Google failed to catch any of those in time either.

Continue reading

Mobile employees are willing to place security above privacy

tablet worker

Given the recent increase of violent incidents around the world, in addition to everyday risks and natural disasters, businesses are naturally concerned about protecting their staff.

New research by enterprise safety application company Everbridge  shows that mobile workers expect that their companies will be able to provide safety information to them should something happen or should they be in the proximity of a serious event. It also shows staff are willing to sacrifice privacy to achieve this.

Continue reading

Top websites struggle to guard against sophisticated bot attacks

web address bar

A report released today shows that, while an average of 16 percent of websites across all industries can thwart simple bot attacks, only five percent are able to properly protect against sophisticated attacks.

The study from bot detection specialist Distil Networks, in conjunction with the Online Trust Alliance (OTA), evaluated the top 1,000 websites in retail, banking, consumer services, government, news media, internet service providers and OTA members.

Continue reading

Consumers ignore security risks for free Wi-Fi

Public wi-fi

A growing number of British consumers are using their neighbors' Wi-Fi, sometimes even without permission, because they can't afford their own.

This is according to a new report by Santander, which also says that the price of phone and broadband services has increased hugely over the past ten years.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.