Security

data threat

Over 10,000 vulnerabilities disclosed this year so far

2018 looks like it's on track to be another record year for vulnerabilities, with over 10,000 disclosed in the half year to June.

The newly released 2018 mid-year VulnDB QuickView report from Risk Based Security shows that 16.6 percent of the reported vulnerabilities received CVSSv2 (Common Vulnerability Scoring System) scores of between 9.0 and 10.0, which is a drop from previous years. However, the severity of the vulnerabilities disclosed still remains significant.

By Ian Barker -
Web redirect

Hijack attack aims to grab bank details via routers

Researchers at DDoS protection specialist Radware have uncovered an attack aimed at Brazilian bank customers that seeks to steal credentials via a compromised router.

It employs malware that targets DLink DSL modem routers using exploits dating back to 2015. A malicious agent attempts to modify the DNS server settings in the routers of Brazilian residents, redirecting all their DNS requests through a malicious server.

By Ian Barker -
malware-infection-rates-first-half-2018

The most malware infected cities in the US

A new report from EnigmaSoft -- makers of the SpyHunter anti-malware product -- reveals the US cities with the highest rates of malware infection.

Systems in Atlanta, Orlando, and Denver are most likely to be infected, with Louisville, Wichita, and Anchorage having the lowest infection rates.

By Ian Barker -
Close inspection

Free tool checks for critical open source vulnerabilities

Every month details emerge of dozens of new security vulnerabilities, and open source software is not immune from these.

In order to help companies stay up to date and ensure vulnerabilities are patched quickly, open source security specialist WhiteSource is launching a free tool that provides companies with immediate, real-time alerts on the 50 most critical vulnerabilities published in the open source community.

By Ian Barker -
cyber hygiene

Organizations struggle with 'cyber hygiene’ basics

Almost two-thirds of organizations are failing to use established benchmarks to set security baselines and are struggling to maintain visibility into their networks, according to a new report.

The study, carried out for security and compliance specialist Tripwire by Dimensional Research, looks at how organizations are implementing security controls that the Center for Internet Security (CIS) refers to as 'cyber hygiene.'

By Ian Barker -
Industrial internet of things

Manufacturing industry at greater risk of cyberattacks

Manufacturing businesses are seeing higher-than-normal rates of cyberattack-related reconnaissance and lateral movement activity.

This is due to the convergence of IT with IoT devices and Industry 4.0 initiatives, according to a new report from AI-powered attack detection specialists Vectra.

By Ian Barker -
Facial recognition of mask

Facial recognition tool helps penetration testing

Using fake social media profiles is a common technique among hackers in order to gain the confidence of targets and direct them to credential stealing sites.

For security and penetration testing teams to replicate this is time consuming as often people have profiles across multiple sites. Ethical hacking specialist Trustwave is using a new tool called Social Mapper that can correlate profiles across multiple sites and make analyzing a person's online presence easier.

By Ian Barker -
Cybercrime cash

Lure of cybercrime leads security professionals to become 'gray hats'

The attractions and profitability of the digital underworld are leading some security practitioners to become 'gray hats' and get involved in cybercrime according to a new report from Malwarebytes.

The study carried out by Osterman Research finds that in the UK as many as one in 13 security professionals are perceived to be gray hats. Globally, mid-sized organizations (those with 500 to 999 employees) are getting squeezed the hardest, and this is where the skills shortage, and the allure of becoming a gray hat, may be greatest.

By Ian Barker -
personal data

Americans value their personal data above their wallets

When asked which items would concern them most if stolen, 55 percent of Americans responding to a new survey named personal data, compared to 23 percent their wallet, 10 percent their car, and just six percent each their phone or house keys.

The study by cyber security and application delivery company Radware  surveyed over 3,000 US adults finds that social security numbers are the data people value most with 54 percent saying they would be most concerned if this was stolen.

By Ian Barker -
BBC breaking news

BBC recommends using VPNs after HTTPS switch leaves it blocked in China

Since switching all of its sites to secure HTTPS rather than plain old HTTP, the BBC has found that it is completely blocked online in China.

The corporation has issued a statement recommending that people in the region looking to access its services should turn to either a VPN, or the censorship-busting app Psiphon.

By Sofia Elizabella Wyciślik-Wilson -
DevSecOps

92 percent of enterprises struggle to integrate security into DevOps

A large majority of organizations are struggling to implement security into their DevOps processes, despite saying they want to do so, according to a new report.

The study commissioned by application security specialist Checkmarx looks at the biggest barriers to securing software today depending on where organizations sit on the DevOps maturity curve.

By Ian Barker -
Twitter logo over cryptocurrency coins

Uncovering the secret life of Twitter bots

How do you know if you're reading tweets from a real person or a bot? As bot technology becomes more sophisticated it's increasingly hard to tell.

Researchers at Duo Security have collected and analyzed data from 88 million public Twitter accounts using machine learning to spot the tactics used by malicious bots to appear legitimate and avoid detection.

By Ian Barker -
Apple store sign

Major virus infection shuts down factories of iPhone chip-maker TSMC

A major virus infection forced the closure of Taiwan Semiconductor Manufacturing Company (TSMC) factories just before the weekend; some remain closed or only partly-operational. TMSC is the largest semiconductor manufacturer in the world and is responsible for producing iPhone processors for Apple.

The company issued a statement indicating that it was not carried out by a hacker. The impact on Apple's iPhone production schedule is also not known, although TSMC expects the incident "to cause shipment delays and additional costs".

By Sofia Elizabella Wyciślik-Wilson -
Fortnite logo

Confirmed: Fortnite for Android will risk players' security by sidestepping Google Play

Fortnite for Android is one of the most eagerly-anticipated game launches of recent times, but the impending release could turn out to be something of a security nightmare. Following on from recent rumors, Epic Games has confirmed that Fortnite will not be made available through the Google Play Store.

Instead users will have to download the game directly from Fortnite.com -- something which means they will have to lower the security settings for their phone by allowing the installation of apps from unknown sources. Despite the security risks involved in this, Epic is eager to avoid paying a 30 percent cut to Google for Play Store distribution; but how long before the plan backfires?

By Sofia Elizabella Wyciślik-Wilson -
Hacker

Preempt allows organizations to detect and block hacker reconnaissance tools

Increasingly cybercriminals are using their initial attacks to probe systems and look for other vulnerabilities or network resources that they can later exploit.

Threat detection platform Preempt is launching new capabilities that allow enterprises to prevent lateral movement and unauthorized domain access due to the misuse of network credentials in reconnaissance tools.

By Ian Barker -

© 1998-2025 BetaNews, Inc. All Rights Reserved.