Security

business security

Organizations suffer breaches despite confidence in their security measures

According to a new survey, 85 percent of respondents are either very or somewhat confident in their organization's security program, yet 41 percent say their company has experienced a security breach and 20 percent more are unsure.

The study from big data specialist Syncsort finds the most common type of breaches are virus/malware attacks (76 percent) and phishing (72 percent). Interestingly, virus attacks came from internal sources roughly half the time while phishing usually came from external sources (78 percent).

By Ian Barker -
Risk dial

In defense of private companies: Creating a cyber risk-aware culture

Each year, the amount of investment organizations -- big and small -- are making to protect their most valuable assets with technological and physical safeguards continues to grow by staggering amounts. Yet, with just one click or touch, an unsuspecting employee can expose a company to cyber spying, ransomware or outright theft.

Private companies are aware of various risks posed to their businesses both from external threat actors (e.g., business/political rivals, organized cyber criminals) and from their own personnel (e.g., disgruntled employees). This year, 38 percent of mid-market and private leaders ranked cybersecurity as a top information technology (IT) investment priority according to Deloitte’s annual mid-market technology trends report. What are they investing in? New information security capabilities, monitoring and detection, and employee education initiatives.

By R. Borelli/J. Bernard -
Reverse engineering

NSA plans to release tool for reverse-engineering software

It feels like it has been a while since we've had any NSA-related news -- interest in mass surveillance has been overtaken by other concerns. After a series of Vault 7 leaks from WikiLeaks about the organization, the NSA is now planning to release its GHIDRA framework, designed to reverse-engineer malware and other software, later in the year.

The framework will be available for Windows, macOS and Linux, and it is set to be demonstrated and publicly released at the RSAConference in March. While it might seem like a bad idea to release a tool that can be used to break down malware and see how it works -- and, therefore, create other similar attack tools -- the idea is actually to help increase security.

By Sofia Elizabella Wyciślik-Wilson -
Marriott Hotel

Marriott hack update: attackers accessed fewer user records than first thought, but 5.3 million passport numbers were unencrypted

Back in late November, Marriott International went public with news that its Starwood Hotel reservation database had been hacked. At the time, the company suggested that up to 500 million customer records had been put at risk as a result, but now it has provided an update with a reduced estimate.

The company now says that it believes up to 383 million guests may have been affected; but the news is not all good. Marriott also reveals that over 5 million unencrypted passport numbers were stolen by hackers.

By Sofia Elizabella Wyciślik-Wilson -
Zero Day

Windows 10 bug could allow files to be overwritten, researcher shows

A security researcher has released proof-of-concept code for a zero-day exploit in Windows 10. The bug was revealed by SandboxEscaper, a researcher who has exposed Windows vulnerabilities in the past.

The latest bug makes it possible to overwrite files with arbitrary data, and while there are numerous criteria that must be met in order for the vulnerability to be exploited, it is still potentially serious. SandboxEscaper warned Microsoft about the problem on Christmas day, before publishing the PoC a couple of days later.

By Sofia Elizabella Wyciślik-Wilson -
Three European flags

Europe to fund bug bounties for 15 open source programs, including VLC, Drupal and Notepad++

Starting in January, the European Commission is going to fund bug bounty programs for a number of open source projects that are used by members of the EU. The initiative is part of the third edition of the Free and Open Source Software Audit (FOSSA) project, which aims to ensure the integrity and reliability of the internet and other infrastructure.

In all, the Commission will fund 15 bug bounty programs, with rewards ranging from €17,000 ($19,400) to €90,000 ($103,000).

By Sofia Elizabella Wyciślik-Wilson -
Los Angeles Times

Major US newspapers hit by cyberattack, disrupting printing and distribution

A number of major US newspapers -- including the Los Angeles Times, Chicago Tribune, Wall Street Journal and New York Times -- have been hit by a cyberattack that is said to originate from another country.

Malware was first detected on Thursday by Tribune Publishing, the owner of some of the affected titles, but unsuccessful attempts at quarantining meant that there was disruption well into Saturday. The Department of Homeland Security is currently investigating the incident which is not thought to have exposed any personal customer details.

By Sofia Elizabella Wyciślik-Wilson -
Cloud data security

The elements of cybersecurity hygiene and secure networks -- Part 2

The blackhat hackers are evolving as quickly as technology is. To protect their sensitive information, companies can put documents in a public cloud. Why the public cloud? While it might seem that public cloud solutions are less reliable than traditional IT platforms, the reality is that they’re actually more secure. With the cloud, a company’s security team is able to monitor network audit logs more closely to detect any abnormalities. Furthermore, audit data can be easily centralized without having to navigate through inconvenient firewall interfaces and other closed proprietary systems. These components are essential for improving security procedures.

The public cloud also allows for more thorough security analyses after an audit. Cloud data analysis systems allow the audit data to be inspected in a more efficient, cost-effective way. These systems take in large quantities of information and are available whenever they’re needed. Real-time monitoring and automated alerts also allow for an immediate response in the event of a security breach. This can dramatically reduce the impact of security incidents and help pinpoint areas that need to be addressed. 

By Stéphane Donzé -
Internet security with browser logos

Rethinking browsers

With browsers often in the middle of many corporate activities, it’s no wonder that they are now subject to many of the same challenges encountered on desktops, smartphones and other hardware-based endpoints. Many IT pros wouldn’t consider browsers to be a critical network endpoint, but those pros would surely place importance on mobile devices, laptops, desktops and servers. Given the valuable role browsers play in accessing enterprise applications and information, it’s time to rethink how we classify them and, more importantly, how we manage and secure them.

Mobility and cloud computing are taking over today’s workforce, and the browser’s significance is trending. The majority of office applications -- such as Microsoft Office 365, Salesforce CRM, and the Zoho One business suite -- run in the cloud and are accessible via browser. These kinds of applications allow users to work from anywhere, at any time, using their laptops, smartphones and other browser-enabled devices.

By Rajesh Ranganathan -
internet_explorer_header_contentfullwidth

Microsoft issues emergency patch to fix serious Internet Explorer zero-day vulnerability

Microsoft has issued an emergency, out-of-band patch for an Internet Explorer zero-day that was being actively exploited in targeted attacks.

The company says that it learned about the vulnerability through a report from Google. CVE-2018-8653 affects a range of versions of Internet Explorer from 9 to 11, across Windows 7 to 10 and Windows Server.

By Sofia Elizabella Wyciślik-Wilson -
Network security

IoT malware up over 200 percent in 2018

New malware targeting IoT devices grew 72 percent, with total malware growing 203 percent in the last four quarters according to McAfee's third quarter threat report.

This growth has been partly due to devices being harnessed for cryptomining. IoT devices such as cameras or video recorders have not typically been used for this because they lack the CPU power of desktop and laptop computers.

By Ian Barker -
Stealing password from code

One in three networks has exposed passwords

Passwords are exposed in Group Policy Preferences in 32.2 percent of networks, according to new research, leaving them open to the risk of hackers traveling laterally through the network.

The study from identity and access specialist Preempt also shows organizations lack visibility and control when it comes to their passwords and privileged users.

By Ian Barker -
AI security

AI security solutions are popular with executives -- but are they really working?

According to a new study released by ProtectWise, AI has already established a strong foothold in the security space, with 73 percent of respondents reporting that they have implemented security solutions that incorporate at least some aspect of AI.

Most organizations cite AI's ability to improve the efficiency of security staff members and make investigation of alerts faster as top priorities.

By Ian Barker -
2019 calendar

The beginning of the end for the password, more regulation and more IoT risks -- cybersecurity predictions for 2019

When we looked at security predictions at this time last year some experts were predicting that we'd see attacks on cryptocurrencies and that we'd continue to see a rise in the scale and profile of attacks.

They've been proved right on both counts over the course of 2018, so what is next year going to have in store? We've canvassed the views of a number of industry figures to find out what they see as the key security issues for 2019.

By Ian Barker -
Stop hand signal

How to stop Windows 10 sharing your data

Earlier this week we reported on how Windows 10 could be sharing your activity data even if you had told it not to.

In response Microsoft has released a statement from Marisa Rogers, privacy officer at its Windows and Devices Group.

By Ian Barker -
betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

© 1998-2025 BetaNews, Inc. All Rights Reserved.