Articles about Security

Cybercriminals use enterprise-grade tools to mount phishing attacks

Big hook

We know that cybercrime is increasingly a very serious business and a new report from Akamai Technologies reveals that enterprise-based development and deployment strategies are being used to create phishing attacks.

Tools such as phishing as a service (PaaS) are being used to leverage some of the world's largest tech brands, with 42.63 percent of domains observed targeting Microsoft, PayPal, DHL, and Dropbox.

Continue reading

The state of stolen credentials on the Dark Web

Lit up keyboard

Every time there's a major data breach it adds to the pool of stolen details available on the Dark Web, but exactly what is out there?

To find out, ImmuniWeb has been analyzing the quality and quantity of stolen credentials accessible on the Dark Web originating from Fortune 500 companies in 10 different industries around the world.

Continue reading

Keeping the DevOps balance between security and speed [Q&A]

DevOps

With DevOps gaining in popularity at many companies, the tension between speed and security is an ongoing issue. This tension exists because the common perception is that security slows down agile development and the CI/CD pipeline.

We spoke to Manish Gupta CEO of continuous application security platform ShiftLeft to discuss the dynamics within DevOps that create this tension and how IT organizations can achieve both speed and security.

Continue reading

Retailers turn to crowdsourced security to protect their systems

security alert

As the holiday season approaches and there's a consequent spike in the amount of money spent online, retail cybersecurity comes under the spotlight.

Bugcrowd is releasing its State of Retail Cybersecurity report that explores the vulnerabilities found among retailers over the last year. Among the key findings is that crowdsourced security adoption increased by 137 percent year on year.

Continue reading

Ransomware sees a revival in 2019's worst cybersecurity threats

Ransomware sign

Cybersecurity company Webroot has released its third annual Nastiest Malware list which shows ransomware making a comeback in addition to other threats.

Phishing and botnets are still popular attack methods and threats across the board are also becoming more sophisticated and harder to detect.

Continue reading

DoH! Google tries to clear up DNS-over-HTTPS confusion

Cartoon Chrome logo

Google has already revealed plans for Chrome which it says will increase privacy and security. DNS-over-HTTPS (DoH) was announced back in September, and the company is already worried that people are confused about the implementation.

The company has published a defensive blog post in which it says that "there has been some misinformation and confusion about the goals of our approach and whether DoH will impact existing content controls offered by ISPs". It goes on to try to dispel the incorrect beliefs it says have built up.

Continue reading

How sharing information can help strengthen cyber defenses [Q&A]

sharing tips

Organizations face a greater range of cyber threats than ever before. The key to dealing with these threats is better intelligence about the latest vulnerabilities.

We spoke to Jay Prassl, CEO of cyber hygiene startup Automox, which has recently launched an open community to foster cyber hygiene best practices, to find out more about how crowdsourcing and information sharing can help reduce the corporate attack surface.

Continue reading

Automated verification solution helps spot spoof and deepfake accounts

fake identities

A major problem for social media and other online businesses is the creation of spoof accounts. Guarding against these can be difficult but identity-as-a-service company Jumio has come up with a solution.

Jumio Go is a real-time, fully automated identity verification platform. It includes liveness detection to spot when photos, videos or even realistic 3D masks are used instead of actual selfies to create online accounts.

Continue reading

Microsoft awarded Pentagon's controversial JEDI contract

Microsoft glass building logo

Microsoft has beaten Amazon to win the controversial $10 billion Joint Enterprise Defense Infrastructure (JEDI) cloud contract from the US Department of Defense.

A year ago, Microsoft employees were trying to discourage the company from bidding for the contract over concerns that the technology is develops could "be used for waging war". The DoD confirmation that the "contract will address critical and urgent unmet warfighter requirements for modern cloud infrastructure" will do nothing to calm these fears.

Continue reading

Adobe exposed personal data of 7.5 million Creative Cloud users in unsecured database

Adobe logo on wall

The personal data of nearly 7.5 million Adobe Creative Cloud users was exposed earlier this month when an unsecured database was discovered online.

The database, which could be accessed by anyone without the need for a username or password, included information such as email addresses, member IDs and payment status. People accessing the database were also able to see which Adobe products were used by individuals, the country they live in, and whether they are Adobe employees.

Continue reading

Aegis Fortress L3: A super-secure portable drive [Review]

Aegis Fortress L3

If you have private files that you want to be able to access when on the go, you could consider uploading them to the cloud, or carrying them around on a USB flash drive. The trouble with the former option is you’re entrusting your content to a third party, and in the case of the latter, you run the risk of losing the drive, allowing anyone who finds it to view your data. You could protect your files using software encryption, but it’s not 100 percent secure.

A much better, and far safer solution is to store your data on a hardware encrypted USB drive like the Aegis Fortress L3.

Continue reading

5G and AI could increase cybersecurity risks

5G

A large majority of cybersecurity and risk management leaders (83 percent) believe that developments in 5G wireless technology will create challenges for their organizations.

A new report from UK-based cybersecurity specialist Information Risk Management (IRM) shows that among the top 5G-related concerns are greater risk of attacks on Internet of Things networks, a wider attack surface and a lack of security by design in 5G hardware and firmware.

Continue reading

Hackers are winning the cybercrime war say business leaders

controlling hacker

A Europe-wide survey of almost 600 successful businesses reveals that 61 percent of business leaders on the board of their company believe that in the war against cybercrime the hackers are more sophisticated than the software developers.

The study carried out for global network RSM by the European Business Awards also finds that 60 percent of these board members believe they may have been breached without them knowing and 73 percent consider themselves at risk from cybercrime.

Continue reading

Cash App targeted by Twitter scams

Scam alert

Cash App, the person-to-person (P2P) payment service application from Square is being targeted by a number of scams using Twitter and Instagram to lure victims.

It's easy to see why Cash App is a prime target, the app has been downloaded 59.8 million times since its 2013 launch, it's been name checked by popular rap artists, and some brands -- including Burger King -- have used it as part of marketing campaigns.

Continue reading

Samsung pushes out patch for Galaxy S10 and Note10 fingerprint scanner vulnerability

Fingerprint on a chip

Following reports that the fingerprint scanners of Galaxy S10 and Note10 handsets can be unlocked with any finger, Samsung is now rolling out a fix.

The security issue was caused by third-party screen protectors interfering with the fingerprint scanners, making it possible for anyone to unlock a phone with an unregistered fingerprint. While the patch is now rolling out, it remains to be seen whether the vulnerability has been addressed fully.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.