Articles about Security

Confirmed: Fortnite for Android will risk players' security by sidestepping Google Play

Fortnite logo

Fortnite for Android is one of the most eagerly-anticipated game launches of recent times, but the impending release could turn out to be something of a security nightmare. Following on from recent rumors, Epic Games has confirmed that Fortnite will not be made available through the Google Play Store.

Instead users will have to download the game directly from Fortnite.com -- something which means they will have to lower the security settings for their phone by allowing the installation of apps from unknown sources. Despite the security risks involved in this, Epic is eager to avoid paying a 30 percent cut to Google for Play Store distribution; but how long before the plan backfires?

Continue reading

Preempt allows organizations to detect and block hacker reconnaissance tools

Hacker

Increasingly cybercriminals are using their initial attacks to probe systems and look for other vulnerabilities or network resources that they can later exploit.

Threat detection platform Preempt is launching new capabilities that allow enterprises to prevent lateral movement and unauthorized domain access due to the misuse of network credentials in reconnaissance tools.

Continue reading

Carbon Black launches real-time security ops solution

endpoint protection

Security and operations teams often have no reliable way to assess the current state of endpoints across their enterprise.

Lack of visibility is a major concern which leads to greater risk of a breach and a lack of information to take appropriate action after a problem occurs.

Continue reading

SMBs rank network security as top concern

Firewall

SMBs are just as likely to be attacked by cybercriminals as larger businesses, yet they lack the budgets and resources to secure their systems and deal with the aftermath of an attack.

It’s not surprising then that a poll of more than 350 SMBs worldwide by cybersecurity specialist Untangle finds that firewall and network security are rated as the top security concerns, particularly as more systems move to the cloud.

Continue reading

Massive router hack used to spread CoinHive cryptomining script

Cryptojacking

Researchers at Trustwave have uncovered an attack on tens of thousands of MikroTik routers which is being used to embed CoinHive cryptominer scripts in websites.

A surge in CoinHive actvity in Brazil at the start of this week alerted researchers that something was happening. Further investigation showed that MicroTik devices were at the root of the problem and all were using the same CoinHive site key.

Continue reading

2FA SNAFU led to Reddit security breach in which user data was stolen

Reddit mobile icon

Reddit has revealed details of a security breach that enabled a hacker to gain access to private messages, usernames and encrypted passwords. The self-proclaimed "front page of the internet" is undertaking an investigation and taking steps to improve security.

The attack took place between June 14 and June 18 this year, and the perpetrator was able to access "all Reddit data from 2007 and before including account credentials and email addresses", the site said in an announcement. The breach was made possible after the attacker beat SMS-based two-factor authentication and compromised several employee accounts.

Continue reading

Android apps carry hidden Windows 10 malware

Android hazard sign

Over 140 apps on the Google Play store have been discovered to contain malicious Windows executable files.

Researchers at Palo Alto Networks found that among the infected apps, several had more than 1,000 installations and carried 4-star ratings.

Continue reading

Spear phishing attack hits more than 400 industrial companies

Phishing

Researchers at Kaspersky Lab have detected a new wave of spear phishing attacks disguised as legitimate procurement and accounting letters, that have hit more than 400 industrial organizations.

The emails have targeted approximately 800 employee PCs, mostly in Russian companies, with the goal of stealing money and confidential data from the organizations, which could then be used in new attacks.

Continue reading

Virtualization tool helps protect critical IP and high value assets

Virtualization

While breaches often focus on consumer or payment information, they also put at risk key intellectual property and business assets.

Virualization-based security specialist Bromium is announcing a new product called Protected App, which allows organizations to establish robust, end-to-end protection around their critical intellectual property (IP) and high value assets (HVAs).

Continue reading

Businesses overestimate consumers' level of 'digital trust'

Broken trust

How much do you trust businesses with your data? A new report from CA Technologies reveals 48 percent of consumers have stopped using the services of an organization because of a data breach.

Yet the study, conducted by analysts Frost & Sullivan shows varying attitudes to data stewardship among businesses, with nearly half admitting to selling customer data, while claiming that data protection is paramount.

Continue reading

Managed detection and response supports internal security teams

data threat

Companies are facing a constant battle against cyber threats, add to this a growing skills gap and security teams don't always have the staff or knowledge to effectively monitor and respond to threats.

Automated detection and response company Fidelis Cybersecurity is launching a new managed detection and response (MDR) service to supplement in-house security resources.

Continue reading

FireEye uses machine learning to guard endpoints

machine learning AI

Traditional signature-based security solutions find it hard to keep up with the fast pace of malware development, so security companies are turning to other solutions.

FireEye is launching a new version of its Endpoint Security product with the addition of a machine learning engine called MalwareGuard.

Continue reading

AlgoSec launches updated security management for cloud and hybrid

Secure cloud

As businesses shift their systems to the cloud there is inevitably an increase in complexity that makes maintaining security more of a challenge.

Security policy management specialist AlgoSec is launching a new version of its Security Management Solution to enable policy management across clouds and software-define networks.

Continue reading

SafeWallet aims to make cryptocurrency transactions easier and more secure

bitcoin-wallet

Anyone who has dabbled in Bitcoin or other cryptocurrencies knows that the wallet process for storing and using coins can be a bit of a pain.

Wallet users are often forced to use long private keys and mnemonic phrases to back up their crypto-assets, with most wallet apps asking users to print their private keys and mnemonic phrases onto a piece of paper, something which can easily be lost or stolen.

Continue reading

Free template helps businesses deal with data breaches

Breach detection

Thanks to legislation like GDPR businesses need to report data breaches promptly or face large fines. However, in the heat of a security incident it can be easy to overlook vital procedures.

Privileged account management specialist Thycotic is aiming to help with the launch of a free Incident Response Policy Template to help businesses take the right steps at the right time.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.