More than 70 percent of consumers fear becoming ID theft victims


The more the internet has become essential to our daily lives, the more people are waking up to the threats that it poses to their safety.
In a new study by F-Secure, 71 percent of respondents say they feel that they will become a victim of cybercrime or identity theft, while 73 percent express similar fears about their children.
Identity and access management proving too difficult for many businesses


According to a new study, businesses find identity and access management (IAM) and privileged access management (PAM) among their most difficult operational tasks.
The survey, by access management firm One Identity, of 200 attendees to the 2019 RSA Conference, finds that while a third of respondents say PAM is the most difficult operational task, only 16 percent of respondents cite implementing adequate IAM practices as a top-three concern when it comes to securing the cloud.
61 percent of organizations are worried about email-borne threats


Email is still the main vehicle for cybercriminals to deliver threats according to a new report, and 61 percent of IT decision makers think their organization will suffer a negative impact from an email-borne attack this year.
The study from email and data security company Mimecast shows that impersonation attacks have increased 67 percent in comparison to the results in last year's report.
Flipboard hacked -- attackers had access to database of user information for 9 months


Flipboard is resetting the passwords of millions of users after suffering a data breach. Hackers were able to access databases containing usernames and passwords, as well as access tokens for some third-party services.
The company has not revealed how many users are affected by the security incident, but says that hackers had access to its systems for a nine months.
Bittium announces the world's most secure smartphone: the Bittium Tough Mobile 2


In a world that is increasingly concerned about privacy and security, Bittium launches the Tough Mobile 2. Proudly billed as "the world's most secure smartphone" it takes a multilayered approach to security, combining both hardware and software solutions.
More than just secure, the Bittium Tough Mobile 2 -- as the use of the word "tough" would imply -- is also a rugged phone (although it does not proclaim to be the toughest phone in world). Designed and manufactured in Finland, the phone is aimed at professionals, and boasts "ultra secure communications without compromising usability".
How microsegmentation can deliver zero trust security [Q&A]


With a never-ending supply of new security threats presenting themselves every day, it can be tough for IT departments to keep up.
While perimeter security continues to be important, the sheer volume of novel attacks means that, eventually, an attack will bypass defenses and gain a foothold in the interior. To harden the network interior, best practice now calls for microsegmentation to achieve a zero trust environment, but that’s not easy to do.
Do IoT devices really pose a security risk, or is it merely paranoia?


Market data firm Statista projects that by 2025, there will be 75 billion IoT devices in use. Smart devices are now found throughout most commercial offices, yet a lack of security could make them ticking time bombs. IoT devices often come with security shortcomings, and it can be difficult to detect when someone has exploited one of their vulnerabilities.
Why are IoT devices dangerous? It's not a single issue; rather, it's intrinsic to the way that the technology itself works.
72 percent of cyber security professionals have considered quitting over lack of resources


A new study from Censornet into the challenges facing cyber security professionals shows that 79 percent think their companies are suffering from a lack of resources, both in terms of people and technology, and 72 percent have considered leaving their jobs for this reason.
The survey also finds that security professionals are not being helped by their security solutions. 65 percent want more technology but the average number of security products used is already 33 and 57 percent report they are suffering from alert overload.
The changing landscape of cybersecurity


Bad actors have been seeking opportunities to take advantage of unsophisticated netizens or unprotected organizations since the dawn of the World Wide Web, but today’s bad actors are in a class by themselves. Nation-state actors, often operating through a vast network of well-funded proxies, strive to exert influence, threaten stability, and sow discord through the mechanisms of cyberspace. Hacktivist organizations seek to undermine, damage or discredit organizations whose agendas and politics they oppose.
They may not be as well funded as nation-state actors, but they are populated by technically sophisticated people who have bought into a cause -- and when these people work together, they can pose serious threats to those with whom they disagree.
Exploit developer SandboxEscaper reveals Windows 10 Task Scheduler zero-day -- and says there are more to come


Well-known security researcher and revealer of exploits SandboxEscaper has released details of a Windows 10 zero-day that affects Task Scheduler. This is far from being the first time we've heard from SandboxEscaper, and this time around the exploit could enable an attacker to gain full control of Windows 10 or Windows Server files.
The researcher has previously revealed details of numerous other security vulnerabilities in Windows, and promises: "I have four more unpatched bugs where that one came from". Furthermore, she says: "I'm donating all my work to enemies of the US".
DDoS attacks increase 84 percent in three months


The number of DDoS attacks during the first quarter of 2019 increased by 84 percent compared with the previous quarter according to a new report from Kaspersky Lab.
This reverses last year's trend of declining DDoS attacks as attackers shifted their attention to other sources of income, such as crypto-mining.
A traditional approach to security harms digital transformation efforts


Half of security professionals who adopt a more traditional or reactive approach to their data protection and security don't believe they will reach their digital transformation goals in the next five years.
This is among the findings of a report from data protection company TITUS which conversely finds that nine out of 10 security professionals deploying a strategic approach believe their current efforts will address digital transformation needs within five years and that their organization would achieve its digital transformation goals in the same timescale.
Enterprises struggle with providing secure hybrid access


As businesses move towards hybrid IT environments they increasingly face threats, gaps and investment challenges to keep their systems secure.
The study from secure access specialist Pulse Secure surveyed enterprises with 1000+ employees in the US, UK, Germany, Austria and Switzerland and finds that while they are taking advantage of cloud computing, all enterprises have on-going data center dependencies.
Most enterprises now run containers in production


New research from storage and data management company Portworx shows 87 percent of IT professionals are now running container technologies, with 90 percent of those running in production.
In addition seven out of 10 are running at least 40 percent of their application portfolio in containers -- an increase from two years ago, when just 67 percent of teams were running container technologies in production.
UK age verification rules could put users at risk


With age verification checks for users of adult sites in the UK set to come into force this summer, cyber security company F-Secure says that the new rules could increase the risk of identity theft and other cyber crimes.
Under the new laws, British internet users will be required to verify their age in order to access adult content websites. This could be by sharing personal information such as passport, driving license, phone number or credit card details with third-party age verification platforms, or by buying a 'porn pass' at a store.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.