Articles about Security

The risks from IoT devices in the workplace

Wireless internet of things

With more and more devices now connecting to the internet, the risk of a security breach from an unsecured piece of kit grows too. But exactly how big is this problem?

Workplace productivity and network security software specialist CurrentWare  has produced an infographic looking at the impact of the IoT on workplace security.

Continue reading

Trend Micro reveals that customer data was illegally sold following inside-job 'security incident'

Trend Micro logo with gradient background

Security firm Trend Micro has revealed details of an inside scam which led to personal details of its customers being exposed.

The security incident dates back to August this year, and the company says that it was made aware of customers being contacted by fake Trend Micro support staff. Following an investigation lasting until the end of October, it was determined that it was a member of staff that had fraudulently gained access to a customer database and sold personal data to a third party.

Continue reading

5 ways for healthcare providers to build a fortress against cyber threats

Firewall

The healthcare industry has yet to find a cure for cyberattacks. Housing personal health data, all kinds of providers are vulnerable targets of hackers and patient care can be put at great risk.

News of breaches in healthcare computer systems is a regular occurrence. Over 100,000 medical records were recently leaked as a result of a data breach at a Montana hospital. And research this year showed an upsurge in malware attacks on healthcare providers. Phishing messages, a means of malware delivery via email, have been found to come in the form of alerts from the US Centers for Disease Control and Prevention (CDC).

Continue reading

2019 could be the worst year ever for holiday retail cybercrime

Cybercriminal with cash

Online fraud increased 30 percent overall in the third quarter of this year and bot-driven account registration fraud is up 70 percent as cybercriminals test stolen credentials in advance of the peak holiday retail season.

These are among the findings of the latest Fraud and Abuse report from Arkose Labs, its analysis of over 1.3 billion transactions spanning account registrations, logins and payments, reveals that one in five account openings were fraudulent.

Continue reading

Firefox users are being targeted by malicious sites that exploit a known bug to lock up the browser

Firefox logo 2019

Users of the Mac and Windows versions of Firefox are being targeted by malicious sites that display a fake warning message and then completely lock up the browser.

Hackers are taking advantage of a bug in Mozilla's web browser to tamper with the software and render it unusable without the need for user interaction. At the moment there is no fix, and the problem is wreaking havoc and causing distress.

Continue reading

Unisys launches new cloud-based biometric identity service

Biometrics

With increasing awareness of fraud and identity theft businesses are under pressure to secure their systems and many are turning to solutions like biometrics to do so.

To bring biometric identity-proofing and authentication capabilities within reach of both large and small enterprises, Unisys is launching an SaaS version of its biometric identity management software.

Continue reading

Trustwave launches advanced threat detection for Azure

web threats

As increasing numbers of businesses shift to cloud and multi-cloud environments, securing systems becomes a much more complex task.

For Microsoft Azure users Trustwave is launching new services to bolster threat monitoring, detection and response natively on the platform.

Continue reading

New system helps defend critical infrastructure from attack

Industrial computer system

Critical infrastructure such as water and power supplies is a prime target for hackers, but is often run using aging systems that weren't designed for the internet era.

Remote access specialist Dispel is launching a new Secure Remote Access platform that helps to protect these systems while at the same time allowing remote access for authorized users to carry out essential maintenance.

Continue reading

Insecure file transfers leave organizations at risk

File transfers

According to a new survey, 78 percent of respondents are still using unencrypted protocols to transfer some of their files, and only 44 percent are using two-factor authentication when connecting to their file transfer server.

The study for VanDyke Software, conducted by Amplitude Research, interviewed 450 professionals involved in data protection and file transfers and finds that 48 percent of companies are transferring files at least multiple times per day and sometimes 'continuously'.

Continue reading

One in five IT workers doesn't know what a cyberattack is

Confused woman

A survey of over 1,000 IT workers, carried out by technology services provider Probrand reveals that more than one in five (21 percent) don't actually know what constitutes a 'cyberattack'.

Used as a catch-all term, cyberattack can cover everything from a simple phishing email, right across to a large-scale server attack, however, many IT workers have never seen, or don't understand, what the real detail of an attack actually looks like.

Continue reading

Google pushes out urgent Chrome update to patch actively exploited zero-day vulnerabilities

Chrome warning tape

Users of Chrome are being urged to update their browsers as Google is rolling out a patch for two serious zero-day vulnerabilities, one of which is already being actively exploited.

The Chrome security team says that both vulnerabilities are use-after-free security issues which can be used to exploit arbitrary code. One vulnerability exists in an audio component of the browser, while the other can be found in the PDFium library. The Windows, macOS and Linux versions of Chrome are all affected.

Continue reading

How automation can contribute to cloud security [Q&A]

Secure cloud

Attacks on cloud systems often take advantage of misconfigurations, something which can easily go undetected.

Can today's security operations teams use automation and leverage advanced analytics to adapt to the current, cloud-based threat landscape and maintain organizational safety?

Continue reading

Hackers breach security at Web.com, Network Solutions and Register.com, accessing private customer info

Hacker

Domain name registrar Web.com has revealed that it fell victim to a data breach earlier in the year. Two of the company's subsidiaries, Network Solutions and Register.com were also attacked by the hackers at the same time.

The incidents took place back in late August, but were only discovered a couple of weeks ago. The attackers were able to access personal details of customers, but Web.com does not say how many people are affected -- although it is likely to run into the millions.

Continue reading

Automated solution helps speed up response to phishing emails

Phishing

As cybercriminals become more sophisticated, spotting phishing emails is increasingly difficult. Even if a user reports something suspicious to the IT security team it can take time to analyze it before others can be warned.

Security automation specialist LogicHub is launching its Autonomous Phishing Triage, which automatically and accurately analyzes and classifies emails with 97 percent accuracy, reducing the number of alerts requiring human analysis by 75 percent or more.

Continue reading

GDPR is changing consumer trust and data security across Europe

GDPR logo

According to the results of a new survey, 74 percent of organizations say that since GDPR was introduced in 2018 it has had a beneficial impact on consumer trust, and 73 percent claim it has boosted their data security.

The study from Check Point questioned 1,000 CTOs, CIOs, IT and security managers from organizations in the UK, France, Germany, Italy and Spain. It shows that GDPR is delivering a strong positive effect overall for European businesses.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.