Articles about Security

Leak shows that Android Q will bring native face unlock to more phones

Face unlock with smartphone

A new Android Q leak suggests that Google is ready to copy another of the features iOS users have come to know and love: facial unlock.

There are already a number of Android handsets -- including recent phones from OnePlus -- which have their own implementation of the biometric security feature, but with Android Q, it is looking as though the feature will be hard-baked into the operating system.

Continue reading

Automated attacks target cloud infrastructure

Cloud data security

Enterprises continue to grow their cloud usage, but this inevitably presents challenges when it comes to keeping systems secure.

New research from Securonix Threat Research highlights an increase in automated attacks targeting cloud infrastructures.

Continue reading

Feel overlooked and underappreciated? You must work in IT security

Head in hands

Most IT security professionals in the UK feel they’re suffering from an image problem among fellow workers, according to new research commissioned by privileged access management specialist Thycotic.

Almost two thirds of respondents (63 percent) feel that their security teams are either viewed as the company naysayers -- specifically either 'doom mongers' or a 'necessary evil' (36 percent).

Continue reading

New solution protects enterprises against ransomware

Ransomware skull

Ransomware attacks are increasingly well targeted and complex, and they can prove devastating for businesses.

Storage specialist Cohesity is launching a new set of anti-ransomware capabilities for its DataPlatform that can directly combat attacks.

Continue reading

New Android app allows simple two-factor authentication across all apps and accounts

Rivetz Authenticator

We're all being encouraged to use two-factor authentication to make our online accounts more secure.

But 2FA can be a major pain when you update to a new device and have to re-authenticate everything. Even when users save their private 2FA keys to migrate onto new devices, it can still take time to manually reset 2FA for each account.

Continue reading

Consumer threats down as cybercriminals target business

Malware

Consumer threats declined by three percent in 2018 as cybercriminals learned that businesses can deliver a much bigger payout.

The latest State of Malware report from Malwarebytes shows consumer threats decreased steadily across the board including a 30 percent drop in adware, an 84 percent decrease in hijacker tools, a 28 percent decrease in worm activity and a 29 percent drop in ransomware.

Continue reading

The most-clicked phishing lines of 2018

Phishing

Security awareness training company KnowBe4 has put together its latest list of the most-clicked phishing subject lines.

Popular categories for phishing messages include, deliveries, passwords, company policies, vacations and IT department. Other popular keywords are, Amazon, Wells Fargo and Microsoft.

Continue reading

Businesses can safely delay patching most vulnerabilities

Eggtimer delay

Patching vulnerabilities is often seen as a key element of keeping systems secure. But a new report suggests businesses could be 'smarter' in their patching regimes and prioritize the issues that present most risk.

The study from Kenna Security suggests companies are increasingly recognizing that the majority of vulnerabilities are never weaponized or exploited in a cyberattack.

Continue reading

Cryptominers dominate 2018's malware landscape

mining-bitcoin

The four most prevalent malware types in 2018 were cryptominers and they impacted 37 percent of organizations globally.

The latest security report from Check Point shows that despite a fall in the value of all cryptocurrencies, 20 percent of companies continue to be hit by cryptomining attacks every week. At the same time ransomware attacks have fallen sharply, impacting just four percent of organizations globally.

Continue reading

Two-thirds of DDoS attacks target communications service providers

DDoS attack start

Communications service providers were targeted by 65.5 percent of DDoS attacks in the third quarter of 2018 according to a new report.

The Q3 2018 Threat Report from Nexusguard shows attackers contaminated a diverse pool of IP addresses across hundreds of IP prefixes by using very small-sized junk traffic.

Continue reading

How to view Wi-Fi passwords in Windows

Wi-Fi password

You have probably used your laptop in all sorts of places. As well as at home and in the office, you may well have used it in hotels, coffee shops and other locations that offer Wi-Fi access.

As such, you've almost certainly got a large number of Wi-Fi passwords saved on your computer, passwords that are seemingly inaccessible. But these saved passwords are accessible -- if you know where to look, that is. This is handy if you need the password to get your phone online, or another laptop. Here's how to recover saved Wi-Fi passwords.

Continue reading

Huge Collection #1 database leak exposes 773 million email addresses and 21 million passwords

Data breach

A massive database leak -- dubbed Collection #1 -- has made its way to hacking forums, exposing millions of email addresses and passwords. The news was first shared by Troy Hunt -- the man behind Have I Been Pwned? -- who explains that the leak comprises, "many different individual data breaches from literally thousands of different sources".

Hunt explains that there are "1,160,253,228 unique combinations of email addresses and passwords", so there are a very large number of people that may have been affected by the leak.

Continue reading

MSSP program helps smaller businesses defend against phishing

Phishing lock

Cybercriminals are increasingly recognizing that smaller businesses can be be lucrative targets as they are able to devote less resources to security.

Phishing defense specialist Cofense is launching a new Managed Security Service Provider (MSSP) program aimed at providing SMBs with human-driven solutions designed to stop active phishing attacks.

Continue reading

New Fortnite vulnerabilities put users' privacy at risk

Fortnite logo

Researchers at security firm Check Point have uncovered vulnerabilities in the popular online game Fortnite that would allow attackers to intercept and steal Fortnite users’ login credentials without them being aware of the theft.

The attack manipulates Fortnite's login process to capture usernames and passwords. Armed with these details attackers could view any data stored in the game, buy more V-Bucks in-game currency at users' expense, and access all the user’s in-game contacts as well as listen in on and record conversations taking place during game play.

Continue reading

SIEM helps enterprises cut number of breaches and detect them sooner

Red and blue security padlock

Security Information and Event Management (SIEM) lets security teams collect and analyze log data from across their IT infrastructure to help detect and combat threats and suspicious activity.

A new report for AlienVault produced by Cybersecurity Insiders reveals three-quarters of cybersecurity professionals believe SIEM is very or extremely important to their organization's security postures.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.