Articles about Security

Windows 10 will soon refuse to connect to WEP networks

Wi-Fi password

There are various ways of protecting wireless networks, and as technology develops old methods become outdated. One wireless security technique that has fallen by the wayside is WEP (Wired Equivalent Privacy) because it is very easily defeated.

Having been superseded by WPA2 and WPA3 (Wi-Fi Protected Access generations 2 and 3), Microsoft is completely dropping support for WEP from Windows 10. Soon, it will not be possible to connect to a wireless network with WEP in place.

Continue reading

Cyber incident ripple effects lead to increased losses

Network

Cybersecurity incidents that involve more than one party incur financial losses 13 times greater than those contained within a single organization according to a new report.

The study carried out by the Cyentia Institute for RiskRecon analyzed over 800 cyber incidents and their 'ripple effect' on multiple downstream organizations.

Continue reading

Cybercriminals step up attacks on the healthcare sector

Comparing all of 2018 against just the first three quarters of 2019 has seen a 60 percent increase in threat detections at healthcare organizations, according to a new report from Malwarebytes.

The industry has been overwhelmingly targeted by Trojan malware during the last year, with attacks increased by 82 percent in Q3 2019 over the previous quarter. The two most dangerous Trojans of 2018–2019 for all industries, Emotet and TrickBot, were the two main culprits.

Continue reading

The Facebook app could be secretly using your iPhone camera behind your back

Facebook iPhone 11 Pro

Facebook is hardy a name that synonymous with privacy, and a newly discovered issue with the iOS version of the Facebook app does nothing to improve the situation.

Web designer Joshua Maddux was alarmed to find that the app was secretly using the camera on his iPhone as he scrolled through his Facebook feed. The problem has been confirmed by others, but it appears to only affects certain iPhones and certain versions of iOS.

Continue reading

ESET launches Full Disk Encryption for businesses

Data encryption

Although businesses go to great lengths to protect their networks, physical loss of devices and the consequent risk to corporate data remains a major concern.

Cyber security company ESET is addressing this with the launch of Full Disk Encryption, allowing IT administrators to remotely deploy, activate, and encrypt connected devices using a one-click action, thus preventing attackers from profiting from lost or stolen computers.

Continue reading

Senior professionals not confident in their security solutions

Worried It worker

More than a third of senior security professionals aren't confident in their choice of security solution and as a result could be put in compromising positions as the organization uses its security posture as a selling point.

This is among the findings of the latest Cyber Confidence Report from Nominet. When asked how confident they were in an organisation’s final choice of security solutions, only 34 percent of CISOs say that they are only somewhat or slightly confident.

Continue reading

Reluctance to automate leads to problems for enterprise network firewalls

Firewall

Enterprises are slow to abandon manual processes, despite being short of staff, and a lack of automation, increasing network complexity and limited visibility are contributing to costly misconfigurations and increased risk.

This is among the findings of the 2019 State of the Firewall Report released today by security automation specialist FireMon, the report is based on responsed from almost 600 people.

Continue reading

Apple is fixing a macOS flaw that exposes snippets of 'encrypted' emails

Mac

Apple is working to fix an issue that makes it possible to read portions of encrypted email in macOS after an IT specialist discovered a flaw in the way Mail's messages are handled by Siri. The problem affects macOS versions from Sierra to Catalina.

It is important to note that there are a number of criteria that have to be met for the issue to rear its head, but the fact that it is possible at all is still a concern. For a company that has just been shouting about its privacy policies, the timing is less than ideal -- particularly as Apple has been aware of the problem since July.

Continue reading

Your Amazon Ring doorbell may have leaked your Wi-Fi username and password

Ring camera with an Amazon logo

If you've ever expressed concern about the security implications of Amazon Ring connected doorbells; if you've ever voiced privacy concerns about letting Amazon have such a portal into your life... your fears have been justified.

It has just been revealed that a security flaw in the camera-toting devices made it possible for hackers to access customers' Wi-Fi usernames and passwords. With these credentials, it would then be possible to launch a wider privacy-invading attack on households, accessing all manner of data and devices on home networks.

Continue reading

The risks from IoT devices in the workplace

Wireless internet of things

With more and more devices now connecting to the internet, the risk of a security breach from an unsecured piece of kit grows too. But exactly how big is this problem?

Workplace productivity and network security software specialist CurrentWare  has produced an infographic looking at the impact of the IoT on workplace security.

Continue reading

Trend Micro reveals that customer data was illegally sold following inside-job 'security incident'

Trend Micro logo with gradient background

Security firm Trend Micro has revealed details of an inside scam which led to personal details of its customers being exposed.

The security incident dates back to August this year, and the company says that it was made aware of customers being contacted by fake Trend Micro support staff. Following an investigation lasting until the end of October, it was determined that it was a member of staff that had fraudulently gained access to a customer database and sold personal data to a third party.

Continue reading

5 ways for healthcare providers to build a fortress against cyber threats

Firewall

The healthcare industry has yet to find a cure for cyberattacks. Housing personal health data, all kinds of providers are vulnerable targets of hackers and patient care can be put at great risk.

News of breaches in healthcare computer systems is a regular occurrence. Over 100,000 medical records were recently leaked as a result of a data breach at a Montana hospital. And research this year showed an upsurge in malware attacks on healthcare providers. Phishing messages, a means of malware delivery via email, have been found to come in the form of alerts from the US Centers for Disease Control and Prevention (CDC).

Continue reading

2019 could be the worst year ever for holiday retail cybercrime

Cybercriminal with cash

Online fraud increased 30 percent overall in the third quarter of this year and bot-driven account registration fraud is up 70 percent as cybercriminals test stolen credentials in advance of the peak holiday retail season.

These are among the findings of the latest Fraud and Abuse report from Arkose Labs, its analysis of over 1.3 billion transactions spanning account registrations, logins and payments, reveals that one in five account openings were fraudulent.

Continue reading

Firefox users are being targeted by malicious sites that exploit a known bug to lock up the browser

Firefox logo 2019

Users of the Mac and Windows versions of Firefox are being targeted by malicious sites that display a fake warning message and then completely lock up the browser.

Hackers are taking advantage of a bug in Mozilla's web browser to tamper with the software and render it unusable without the need for user interaction. At the moment there is no fix, and the problem is wreaking havoc and causing distress.

Continue reading

Unisys launches new cloud-based biometric identity service

Biometrics

With increasing awareness of fraud and identity theft businesses are under pressure to secure their systems and many are turning to solutions like biometrics to do so.

To bring biometric identity-proofing and authentication capabilities within reach of both large and small enterprises, Unisys is launching an SaaS version of its biometric identity management software.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.