Articles about Security

Major ransomware attack spreads rapidly across Europe

Ransomware

Companies, government departments and airports in the Ukraine have been hit by ransomware this afternoon and the attack now appears to be spreading across Europe.

In Ukraine, government departments, the central bank, a state-run aircraft manufacturer, Kiev airport and the metro network have all been hit. In the UK, the advertising company WPP says its systems have also been taken down, and Danish transport company Maersk reports sites and business units shut down by the attack.

Continue reading

How to get regular free security updates for Windows XP and Vista

Whisper

Two months ago, in an effort to fightback against the WannaCry ransomware, Microsoft took the 'highly unusual' step of releasing a patch for Windows XP, the ancient operating system it stopped supporting back in 2014 (even though, as it turned out, it was really Windows 7, not XP, that was to blame for the spread of the devastating malware).

Then just two weeks ago, Microsoft included Windows XP and Vista -- another operating system it no longer supports -- in June's Patch Tuesday updates. Despite these recent actions, neither XP nor Vista are going to receive regular security updates from Microsoft, meaning users still running either OS remain at serious risk. However, the good news is there are a couple of tricks you can use to continue receiving security updates for both XP and Vista.

Continue reading

Platform enhancements protect enterprise mobile data without harming usability

mobile cloud enterprise

As companies face ever greater demands for flexible working and BYOD use, it places an added stress on the need for securing mobile data.

Mobile app management specialist Apperian is addressing this with the launch of several enhancements to its platform aimed at increasing the security of enterprise mobile app data, without compromising usability.

Continue reading

Comodo launches free endpoint detection for enterprises

virus spreading network devices nodes connected Internet of Things malware hacked bot

Hot on the heels of its enterprise threat analysis tool released last month, cyber security specialist Comodo is now launching another free enterprise tool with its endpoint detection and response (EDR) solution.

The fully-featured, enterprise-class, cWatch EDR solution is being made available at no charge to customers. This move enables any size of organization to better detect malware on endpoints, and investigate and respond to security incidents.

Continue reading

Don't ignore DDoS protection when attack trends change

ddos_attack

Businesses should ensure that they are still securely protected against DDoS attacks, despite the recent growth of other trends such as ransomware.

That’s the warning from Arbor Networks, which is urging organizations of all sizes to make sure they stay safe online as DDoS attacks are still rife around the world.

Continue reading

UK parliament cyber attack highlights the shortcomings of passwords

enterprise security login authentication verification user password

As we reported over the weekend the UK parliament's email system was subject to a brute force attack using passwords stolen in the 2012 LinkedIn breach.

Security experts have been quick to point out the inherent weakness in large organizations and government departments relying on passwords to protect highly sensitive data.

Continue reading

Thanks to Word macros, Windows 10 S isn't as secure as Microsoft would have you believe

windows-10-s-logo

With Windows 10 S Microsoft has made the bold claim that this locked down version of its operating system is immune to all known ransomware. This may well be true, but that's certainly not to say that Windows 10 S is completely secure. Lock up your Surface Laptop!

An investigation carried out by ZDNet found that Windows 10 S -- despite only supporting the installation of apps from the Windows Store -- is vulnerable to that old security nightmare: Word macros. The problem comes about because the macros have full access to the Windows API, opening up a potential attack vector.

Continue reading

Businesses spend $2,300 to deal with a malware attack

Hackers laptops

To remedy a malware attack businesses need to shell out, on average, $2,300 per attack. This is according to a new report by Arbor Networks.

The report, produced in partnership with research organization 451 Research, says spear phishing attacks are still most successful of all the different methods of entry.

Continue reading

Russian hackers stole and sold passwords belonging to British politicians

red-hacker

An investigation by the Times has found that passwords belonging to British officials have been traded by Russian hackers. The passwords and email addresses of tens of thousands of politicians, senior police officers and diplomats were sold or swapped following an attack on LinkedIn in 2012.

As well as LinkedIn, some information seems to have been garnered from MySpace. The credentials for politicians, including education secretary Justine Greening and business secretary Greg Clark, were initially put on the market for sale or trade, but were later made available free of charge.

Continue reading

Cyber attacks and regulations don't change businesses' digital transformation plans

Digital transformation

Businesses looking to digitally transform won’t be intimidated by cyber-attacks or data protection regulations, according to a new report by Advanced.

Based on a poll of more than 500 senior executives in UK organizations, Advanced says organizations are concerned, but won’t give up.

Continue reading

Cloud-native workloads gain momentum

Cloud

A new survey shows that 18 percent of organizations now have more than half of their workloads in cloud-native environments. In addition many are moving from on-premises and self-hosting toward shared environments, distributing workloads across multiple providers.

The study by cloud security and network software firm Cohesive Networks also finds 57 percent of respondents say that cloud-native workloads make up at least 20 percent of applications in Infrastructure-as-a-Service (IaaS).

Continue reading

Virgin Media warns Super Hub 2 owners to change their passwords due to hacking risk

virgin-media

Virgin Media is urging hundreds of thousands of customers with its Super Hub 2 router to change their passwords after a Which? investigation uncovered a way for hackers to gain access to the device.

If the password for the router is not changed from its default there is a risk from hacking, but Virgin Media said the risk is small. Nevertheless, as a precautionary measure a password change is the advice for more than 800,000 users.

Continue reading

Microsoft Edge bug bounty program now permanent

Computer bug

Microsoft introduced a bug bounty program for Edge last August. Originally intended as a temporary thing, it will now live on as the software giant reports that it has lead to major improvements in its browser's security.

As is the case with bug bounty programs, part of the appeal for security researchers is the financial side. In this case, Microsoft says that it has paid over $200,000 in bounties in since it kicked off.

Continue reading

The value of information on the dark web

dark web

We're all familiar with the concept of the dark web where information gained from hacks and data breaches is traded amongst cyber criminals. But just how much are your identity and account credentials worth?

Password manager and digital vault app Keeper Security has produced an infographic looking at how much various pieces of information trade for.

Continue reading

Facebook uses India as a testing ground for profile picture protection features

facebook-profile-picture-protection

It's a common belief that anything that appears online is fair game for downloading and sharing, and this idea extends to Facebook profile pictures. Facebook has found that in India in particular there is great concern from users -- particularly woman -- about uploading a profile picture in case it is download and shared elsewhere.

Responding to this, the social network is trialling features that will grant users more control over their profile pictures. Facebook is not only introducing a new profile picture guard, but also encouraging people to add a design layer to their images to discourage misuse by others. If the trial proves successful, the feature will enjoy a wider rollout.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.