Articles about Security

DDoS attacks increase 84 percent in three months

DDoS attacks

The number of DDoS attacks during the first quarter of 2019 increased by 84 percent compared with the previous quarter according to a new report from Kaspersky Lab.

This reverses last year's trend of declining DDoS attacks as attackers shifted their attention to other sources of income, such as crypto-mining.

Continue reading

A traditional approach to security harms digital transformation efforts

cell keys

Half of security professionals who adopt a more traditional or reactive approach to their data protection and security don't believe they will reach their digital transformation goals in the next five years.

This is among the findings of a report from data protection company TITUS which conversely finds that nine out of 10 security professionals deploying a strategic approach believe their current efforts will address digital transformation needs within five years and that their organization would achieve its digital transformation goals in the same timescale.

Continue reading

Enterprises struggle with providing secure hybrid access

Secure cloud

As businesses move towards hybrid IT environments they increasingly face threats, gaps and investment challenges to keep their systems secure.

The study from secure access specialist Pulse Secure surveyed enterprises with 1000+ employees in the US, UK, Germany, Austria and Switzerland and finds that while they are taking advantage of cloud computing, all enterprises have on-going data center dependencies.

Continue reading

Most enterprises now run containers in production

cloud containers

New research from storage and data management company Portworx shows 87 percent of IT professionals are now running container technologies, with 90 percent of those running in production.

In addition seven out of 10 are running at least 40 percent of their application portfolio in containers -- an increase from two years ago, when just 67 percent of teams were running container technologies in production.

Continue reading

UK age verification rules could put users at risk

identity verification

With age verification checks for users of adult sites in the UK set to come into force this summer, cyber security company F-Secure says that the new rules could increase the risk of identity theft and other cyber crimes.

Under the new laws, British internet users will be required to verify their age in order to access adult content websites. This could be by sharing personal information such as passport, driving license, phone number or credit card details with third-party age verification platforms, or by buying a 'porn pass' at a store.

Continue reading

Linux kernel RDS flaw affects Red Hat, Ubuntu, Debian and SUSE

Linux penguin

If you're not in the habit of keeping up to date with the latest version of the Linux kernel, now might be a good time to think about doing so. Systems based on versions of the kernel older than 5.0.8 suffer from a severe flaw in the implementation of RDS over TCP.

Left unpatched, the flaw could enable an attacker to compromise a system. The National Vulnerability Database entry says: "There is a race condition leading to a use-after-free, related to net namespace cleanup".

Continue reading

Google recalls Bluetooth version of Titan Security Key after discovering hacking vulnerability

Google Titan Security Key

Google is recalling the Bluetooth Low Energy (BLE) version of its Titan Security Key, and is offering free replacements to owners.

The recall comes after the company became aware of a security issue which could allow a nearby hacker to hijack the security device. Google says that the security issue only affects the Bluetooth versions of the 2FA device sold in the US.

Continue reading

Trump invokes National Emergencies Act effectively banning Huawei from US

Huawei store sign

Donald Trump has declared a national emergency to fight "foreign adversaries" which he says are "increasingly creating and exploiting vulnerabilities in information and communications technology".

An executive order means that US companies are banned from buying and using foreign telecoms equipment which is deemed to be a threat to national security. Huawei and 70 affiliates have also been added to the US Commerce Department’s "Entity List" meaning that special approval would be needed to purchase such equipment, and also for companies deemed to pose a threat to buy US-made hardware.

Continue reading

Four out of five people expect Facebook to have another data privacy issue this year

Facebook key

People are becoming more aware of the need to protect their data online, not just because of the rate of cybercriminal activity, but also because large organizations are frequently being careless with the data they hold.

A new survey of 1,000 people from OpenVPN reveals that four out of five people are expecting Facebook to face at least one more data privacy issue in the next year. In addition 71 percent say recent scandals have somewhat or severely negatively affected their view on Facebook, while 37 percent trust tech giants less now because they don’t think the companies have properly addressed the data privacy problems.

Continue reading

46 percent of organizations consider taking personal data out of the cloud

Secure cloud

A new study finds that 46 percent of organizations which store customer personally identifiable information (PII) in the cloud are considering moving it back on premises due to data security concerns.

The research from information security software company Netwrix also shows that of the 50 percent of organizations that store customer data in the cloud, 39 percent had security incidents in the past year and more than 50 percent of those couldn’t diagnose the problem.

Continue reading

WhatsApp users urged to install app update to patch serious spyware vulnerability

WhatsApp, Facebook and Instagram icons

Users of WhatsApp could be infected by dangerous spyware just by receiving a call. The spyware, which is thought to  originate from Israeli cyber intelligence firm NSO Group, can be installed just by calling a target -- there is no need for the call to be answered.

A security advisory on the Facebook website does not go into much detail about the exploit, which takes advantage of a buffer overflow vulnerability. WhatsApp says it was discovered earlier this month, and with 1.5 billion users, there are a huge number of people that are potentially affected.

Continue reading

Website attacks turn to stealth to boost their success

Cyber disruption

The story of website attacks in 2018 was one of high profile cybercrime, targeted at cryptocurrency, business, elections and more.

A new report from website security specialist SiteLock reveals that attackers are now taking a stealthier approach.

Continue reading

This little piece of tech can turn your old alarm into a home automation system

When people decide to install home automation systems and also have security alarms they installed several years ago, it's highly likely the new tech and old gadgets won't be compatible.

Similarly, if they have a security system that doesn't work with a smartphone app, they typically have to invest in new hardware and deal with lengthy installations and high bills.

Continue reading

Uncovering the everyday frustrations of cybersecurity professionals

Head in hands

Anyone who has worked in IT knows that it can be a frustrating experience at times. A new survey carried out by network security provider Lastline at RSAC 2019 set out to discover security professionals' attitudes and frustrations towards their jobs.

These come from a number of places, including resources, management and other workers. We all know that there's a skills shortage in security, but funding is often an issue too.

Continue reading

Helping organizations understand the pros and cons of blockchain

Blockchain word cloud

Blockchain is often seen as a game-changer for businesses, governments and criminals alike. But, as organizations rush to deploy applications based on blockchain technology, do the potential benefits outweigh the information risks?

The Information Security Forum (ISF) is releasing a new briefing paper aimed at boosting understanding of the technology.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.