Articles about Security

The elements of cybersecurity hygiene and secure networks - Part 3

Data cloud lock

While it’s essential that employees consistently avoid taking risks that could lead to a data breach, even top-performing employees don’t necessarily have top-notch cybersecurity knowledge. Thus, organizations are in charge of bridging the cybersecurity skill gap to keep employees from damaging the company’s network by accidentally uploading of a malicious program or sharing confidential documents with the wrong people.

Though it’s easy for IT and leadership teams to put systems in place that defend their network from external threats, well-intentioned internal users can be a hackers easy way in. The only way for organizations to counter this is with education and training.

Continue reading

Symantec boosts its endpoint security offering

endpoint protection

Sophisticated attackers are increasingly taking advantage of the complexity of endpoint environments to exploit gaps and discover new paths to lucrative targets.

Symantec is announcing enhancements to its endpoint security portfolio designed to defend against the most sophisticated cyberattacks as well as improving application discovery and risk assessment.

Continue reading

Rush to digital transformation puts security of data at risk

Risk dial

Digital transformation projects are underway in the vast majority of businesses, according to a new report, but 'aggressive' transformers are most at risk from data breaches.

The latest Data Threat Report from Thales eSecurity shows digital transformation in some form is happening in 97 percent of organizations. 86 percent say they feel vulnerable to threats, yet less than a third of respondents (only 30 percent) are using encryption within these environments.

Continue reading

How to disable FaceTime and protect your privacy

FaceTime icon crossed out

By now you have probably heard about the bug that's been discovered in Apple's FaceTime. In short it is an exploit that lets you connect a call you have placed rather than waiting for the recipient to pick up -- so you can then listen to audio and watch video.

Apple is working on a fix, and it you want to be sure that you don't fall victim to eavesdropping, you should think about disabling FaceTime on your iOS device. Here's how to do just that.

Continue reading

Massive FaceTime privacy bug lets people eavesdrop on audio and video calls before they've been answered -- and Apple doesn't have a fix yet

FaceTime icon

Apple is scrambling to fix a serious bug that has been discovered in its FaceTime messaging services. The bug makes it possible to spy on the people being called, even if the call is not picked up.

This is a serious privacy issue, as it gives someone the ability to secretly eavesdrop on someone -- or even watch them -- without their knowledge. At the moment, Apple does not have a fix but the company says it is working on the problem and will address it by the end of the week. In the meantime, you may want to consider disabling FaceTime on your iOS device.

Continue reading

69 percent of employees share passwords with colleagues

Written passwords

According to a new study, 69 percent of respondents admit to sharing passwords with others in the workplace, and 51 percent reuse an average of five passwords across their business and personal accounts.

The study by authentication key vendor Yubico and Ponemon, released to coincide with Data Protection Day, also finds two-factor authentication isn't widely used, 55 percent don't use it at work and 67 percent don't use it for their personal accounts.

Continue reading

Leak shows that Android Q will bring native face unlock to more phones

Face unlock with smartphone

A new Android Q leak suggests that Google is ready to copy another of the features iOS users have come to know and love: facial unlock.

There are already a number of Android handsets -- including recent phones from OnePlus -- which have their own implementation of the biometric security feature, but with Android Q, it is looking as though the feature will be hard-baked into the operating system.

Continue reading

Automated attacks target cloud infrastructure

Cloud data security

Enterprises continue to grow their cloud usage, but this inevitably presents challenges when it comes to keeping systems secure.

New research from Securonix Threat Research highlights an increase in automated attacks targeting cloud infrastructures.

Continue reading

Feel overlooked and underappreciated? You must work in IT security

Head in hands

Most IT security professionals in the UK feel they’re suffering from an image problem among fellow workers, according to new research commissioned by privileged access management specialist Thycotic.

Almost two thirds of respondents (63 percent) feel that their security teams are either viewed as the company naysayers -- specifically either 'doom mongers' or a 'necessary evil' (36 percent).

Continue reading

New solution protects enterprises against ransomware

Ransomware skull

Ransomware attacks are increasingly well targeted and complex, and they can prove devastating for businesses.

Storage specialist Cohesity is launching a new set of anti-ransomware capabilities for its DataPlatform that can directly combat attacks.

Continue reading

New Android app allows simple two-factor authentication across all apps and accounts

Rivetz Authenticator

We're all being encouraged to use two-factor authentication to make our online accounts more secure.

But 2FA can be a major pain when you update to a new device and have to re-authenticate everything. Even when users save their private 2FA keys to migrate onto new devices, it can still take time to manually reset 2FA for each account.

Continue reading

Consumer threats down as cybercriminals target business

Malware

Consumer threats declined by three percent in 2018 as cybercriminals learned that businesses can deliver a much bigger payout.

The latest State of Malware report from Malwarebytes shows consumer threats decreased steadily across the board including a 30 percent drop in adware, an 84 percent decrease in hijacker tools, a 28 percent decrease in worm activity and a 29 percent drop in ransomware.

Continue reading

The most-clicked phishing lines of 2018

Phishing

Security awareness training company KnowBe4 has put together its latest list of the most-clicked phishing subject lines.

Popular categories for phishing messages include, deliveries, passwords, company policies, vacations and IT department. Other popular keywords are, Amazon, Wells Fargo and Microsoft.

Continue reading

Businesses can safely delay patching most vulnerabilities

Eggtimer delay

Patching vulnerabilities is often seen as a key element of keeping systems secure. But a new report suggests businesses could be 'smarter' in their patching regimes and prioritize the issues that present most risk.

The study from Kenna Security suggests companies are increasingly recognizing that the majority of vulnerabilities are never weaponized or exploited in a cyberattack.

Continue reading

Cryptominers dominate 2018's malware landscape

mining-bitcoin

The four most prevalent malware types in 2018 were cryptominers and they impacted 37 percent of organizations globally.

The latest security report from Check Point shows that despite a fall in the value of all cryptocurrencies, 20 percent of companies continue to be hit by cryptomining attacks every week. At the same time ransomware attacks have fallen sharply, impacting just four percent of organizations globally.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.