Articles about Security

Indian cybersecurity market set to hit $3 billion by 2022 but tech-savvy youngsters turn to crime

Enter button with India Flag

A new report shows that India is increasing its cyber capabilities and becoming a growing cyber powerhouse with its cybersecurity market expected to rise from $1.97 billion in 2019 to over $3 billion by 2022.

But the study from threat intelligence platform IntSights also shows that the country has a growing cybercriminal underground. A young, tech-savvy population with limited access to careers in the domestic tech sector is at risk of being lured into cybercriminal activities to provide for their families.

Continue reading

Securing privileged access can reduce the risk of data breach [Q&A]

Admin login

Accounts that have privileged access are a problem when it comes to data breaches, so securing them effectively is essential.

But things are complicated by the fact that where privileged access was once designated only for system administrators it has now been expanded to HR, finance, legal and many more parts of the organization, as well as to non-human users like machines and applications.

Continue reading

DDoS attacks increase more than 500 percent over last year

DDoS attack start

The second quarter of 2020 has seen a massive 570 percent increase in 'bit-and-piece' DDoS attacks compared to the same period last year, according to the latest threat report from Nexusguard.

Bit-and-piece attacks target ASN-level communication service provider (CSP) networks by dispersing small pieces of junk traffic across a diverse pool of IP addresses across hundreds of IP prefixes.

Continue reading

Free tool helps security professionals improve ransomware defenses

Ransomware skull

Ransomware is a persistent problem, with cybercriminals always looking for new ways to evade detection and infect systems. Attacks have increased 20 percent in the first half of this year.

Endpoint detection and response company Nyotron is launching a new, free online tool called Ransomwiz that allows allows security professionals to check their defenses by generating actual ransomware samples using a variety of real-world attack techniques.

Continue reading

How extra demand for cashless payment services is changing the banking world [Q&A]

mobile payment

One of the side effects of the COVID-19 pandemic has been a marked reduction in the use of cash as people have shifted to using cashless and contactless payment methods.

This has put increased pressure on financial institutions to offer digital services, but it’s also shone a spotlight on the measures needed to prevent fraud and on initiatives to integrate cryptocurrency into everyday transactions.

Continue reading

Public-private collaboration could help protect government systems from cyber threats

Public private sectors

More than 80 percent of government cyber security leaders think public-private collaboration would help them keep pace with cyber threats, according to a new report.

The study from Nominet of government agencies in the UK, US and the Middle East, also shows that 65 percent of respondents think their pace of change is too slow in comparison to enterprises and 81 percent believe that a slow pace of change can negatively impact national cyber defense.

Continue reading

Cybercriminals seek to capitalize on COVID-19

covid cybercrime

Starting in March and continuing through most of the spring, there has been a significant increase in malicious emails utilizing various COVID-19 issues as a lure to manipulate users into exposing themselves to various email attacks and scams.

The latest Attack Landscape report from F-Secure shows COVID-related emails range from attempting to trick users into ordering face masks from phony websites to infecting themselves with malware by opening malicious attachments.

Continue reading

New tool helps protect enterprises from insider threats

insider threat

With workforces more dispersed and reliant on collaboration technologies, the risk of sensitive business information falling into the wrong hands is increased.

Code42 is launching a new SaaS tool called Incydr, aimed at guarding intellectual property, source code and trade secrets, built to mitigate exposure from data exfiltration and to directly address the gaps in traditional security solutions for insider threats.

Continue reading

Ransomware operators work together to maximize effectiveness of attacks

Ransomware sign

The numerous challenges of 2020 have proved to be fertile ground for ransomware attacks, with the number up by nine percent compared to the first quarter and by 59 percent compared to the second quarter of 2019.

The latest Threatscape report from Positive Technologies shows that 16 percent of phishing attacks took advantage of COVID-19 concerns, and there is also evidence that ransomware operators have started cooperating with each other.

Continue reading

QR code use grows in popularity but poses hidden risks

QR code

The use of QR codes has risen during the pandemic as they offer a perfect solution to contactless interaction. But many employees are also using their mobile devices to scan QR codes for personal use, putting themselves and enterprise resources at risk.

A new study from security platform MobileIron shows that 84 percent of people have scanned a QR code before, with 32 percent having done so in the past week and 26 percent in the past month.

Continue reading

Kaspersky says Linux systems are increasingly being targeted by hackers

Linux

Hackers are increasingly turning their attention to attacking Linux servers and workstations, according to security researchers from Kaspersky.

While it is Windows systems that have traditionally been in the cross-hairs of attackers, advanced persistent threats (APTs) are now a serious issue in the Linux world. Linux systems are being specifically targeted with an ever-widening selection of malware tools.

Continue reading

Dashlane launches new password health reporting tool for businesses

Password on a PostIt

Good security practices are more important than ever in the current climate, with people working from home using their own devices.

Password management specialist Dashlane is launching a new reporting tool that gives company administrators in-depth visibility into employee password security along with the ability to track improvements over time.

Continue reading

Organized attacks on cloud infrastructure and software supply chain increase

Broken chain

A new threat report from Aqua Security reveals a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure.

While most attacks uncovered by Team Nautilus, Aqua's cybersecurity research team, were aimed at abusing public cloud compute resources for cryptocurrency mining, the methods used also open the door for higher-value targets that look to exploit security gaps in container software supply chains and runtime environments.

Continue reading

Zoom boosts security with 2FA for all users

Zoom plane

After suddenly hitting the big time during the coronavirus pandemic, video conferencing tool found itself the center of attention for both good and bad reasons. While people welcome the app facilitating remote working, Zoom's security and privacy credentials were called in to questions in a series of incidents.

The company subsequently promised to take action to improve things in these areas, and over the summer there have been ongoing updates to Zoom. Now two-factor authentication (2FA) has been made available to all users.

Continue reading

Making the case for Trust in Zero Trust

Trust card

As WFH continues and bad actors and cyberthreats thrive, it is more critical than ever before for organizations to have a robust cybersecurity strategy in place. The best way to get started? Leverage Zero Trust.

The chief concern security teams have is keeping threats and attacks out of their organizations. This is why CISOs make significant investments in security controls that protect important vectors like the network, data center, cloud, email and endpoint. This defense-in-depth approach is essential to detect and block threats, but they need to be bolstered with Zero Trust capabilities. Why? Simply put, because attacks and breaches continue to occur. In fact, we know that 64 percent of CISOs believe their organization is more likely to experience a data breach due to COVID-19, and an additional 30 percent of CISOs have seen more attacks on their IT systems as a direct result of COVID-19.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.