Apple releases important Big Sur and iOS updates to fix WebKit vulnerability


Apple has issued a couple of important security updates for its desktop and mobile operating systems. The company has released iOS 14.4.1 and macOS 11.2.3, both of which are described as being "recommended for all users".
The reason for this is simple -- these are important updates that patch a memory corruption bug that could be exploited by malicious websites. This is in addition to the vulnerabilities that have already been patched in another iOS update last month.
Over $200 billion at risk if top brands suffer a data breach


A new report looking at the long-tail impact data breaches have on a brand's value shows that the world's 100 most valuable brands could lose as much as $223 billion from a data breach.
The study from IT consulting firm Infosys and brand consultancy Interbrand looks at the brand factors most impacted when a company suffers a data breach -- presence, affinity, and trust -- and simulates the resulting brand value at risk in the event of a breach.
Browser patch lag can put home workers at risk


Remote working continues to present a security problem for businesses and an issue that is often overlooked is the delay in patching browsers.
New research from Menlo Security looks at the importance of this issue for both desktop and remote users, focusing particularly on Google Chrome.
The changing role of women in cybersecurity


Today's International Women's Day presents an opportunity to look at the role of women in cybersecurity and get the views of some of the leading women in the sector.
As we reported last week women in the cybersecurity industry think that it could take a decade to gain equality.
Essential points to know before implementing a cybersecurity transformation program


In light of the recent explosion of cyber attacks and the changes brought about by the pandemic, there appears to be a compelling need for cybersecurity transformation. Businesses have to update their cyber defenses or risk the possibility of falling prey to persistently sophisticated attacks.
Transforming an organization’s security posture, however, is not as easy as it sounds. It takes time, expertise, and resources. One bad decision or an inadequacy in the technologies employed will render the transformation useless. Things can even become worse than the previous state. To make sure that it yields the expected benefits, organizations need to do it correctly.
Women in cybersecurity think equality will take at least 10 years


The poor state of diversity in the cybersecurity industry is shown by a new report in which 57 percent of women working in the industry believe it will take at least a decade for them to be treated as equals to men, with 20 percent believing it will never happen.
The study from the UK's Chartered Institute of Information Security (CIISec), released in advance of Monday's International Women’s Day, shows women are struggling to progress both due to the status quo of the industry and also not getting the required support.
76 percent of US employees have inappropriate access to sensitive files


A new report from vArmour shows that 76 percent of employees have inappropriate access to a sensitive file, and 76 percent were granted inappropriate access to sensitive files within the past year.
IT leaders surveyed also expressed concern about inappropriate or malicious access to applications and data, with 47 percent concerned about malicious actors impersonating employees and 41 percent concerned about inappropriate access to sensitive information.
Business applications targeted in phishing campaigns


Business-related applications such as Zoom, Microsoft and DocuSign, now account for 45 percent of impersonation-related phishing attacks as cybercriminals seek to cash in on the vulnerabilities of remote work.
This is one of the findings of a new report from email security company GreatHorn which collected data from over 580 participants working across a diverse set of roles within the information technology security market.
Online banking fraud attempts soar in 2020


Hot on the heels of yesterday's study revealing a lack of trust in online banking a report out today shows a 250 percent increase in attempted online banking fraud last year.
The research from Feedzai shows a 200 percent increase in mobile banking use, but both telephone and branch fraud rates dropping to lower levels than they had been before the pandemic.
Americans flock to online banking -- but many still don't trust it


Americans' online banking usage has reached 85 percent, with 25 percent using online banking exclusively. But trust is lagging behind.
A new report from NordVPN shows 40 percent of respondents report that they check their banking apps on a daily basis for compromises. 13 percent say they don't trust, and 27 percent have doubts about, their banking app.
A third of enterprises suffer unauthorized cloud access


Last month we reported on public sector organizations suffering from cloud leakage. A new report out today shows that this is an issue in the private sector too.
The report from cloud governance platform CloudSphere reveals that 32 percent of enterprises have experienced unauthorized access to their cloud resources.
Why supply chains are today's fastest growing cybersecurity threat


Business ecosystems have expanded over the years owing to the many benefits of diverse, interconnected supply chains, prompting organizations to pursue close, collaborative relationships with their suppliers. However, this has led to increased cyber threats when organizations expose their networks to their supply chain and it only takes one supplier to have cybersecurity vulnerabilities to bring a business to its knees.
To this point governments around the world have highlighted supply chains as an area for urgent attention in tackling cyber risk in the coming years.
Tightly knit information security and knowledge management together


Cyber criminals have thrived during this pandemic. In the first quarter of 2020, DDoS attacks rose by 278 percent compared to the corresponding quarter in the previous year. UK business alone are estimated to have lost over £6.2 million to cyber scams through social engineering. Globally, taking advantage of people’s vulnerabilities and the overnight pivot to 'working from home', fraudsters tricked people into clicking on links to download malware and collect confidential corporate information. Threats of ransomware increased as well.
It’s no surprise then that to combat this situation, many enterprises, and especially professional services firms, who have long been targeted by cyber criminals, view adopting need-to-know security measures as a priority. It presents a sound way to restrict access to corporate data to those who need it or are authorized to view the information in today’s 'work from anywhere' business environment.
How and why the telecoms industry is coming under sustained attack [Q&A]


The trend towards digital transformation and the sudden shift to remote working has seen the telecommunications industry become a prime target for both criminal and state-sponsored attacks.
Threat intelligence specialist IntSights has produced a new report focusing on the threats to the telecoms industry and we spoke to Paul Prudhomme, cyber threat intelligence advisor at the company to find out more.
North star metrics for security operations


The Solarwinds case has cemented the role of enterprise security in protecting business risk and advancing resiliency. As security continues to elevate and garner a seat at the board-level, we need to rely less on articulating the Fear, Uncertainty and Doubt (FUD) and rely more on communicating in terms of clear operational metrics as a way of establishing a baseline and goals in language the board can understand.
In the last year, we’ve seen a step-change in adoption of Mean-time-to-Detect and Mean-time-to-Respond as the core metrics forward-thinking security leaders are adopting as the north star metrics for their organization.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.