Long-lasting DDoS attacks make a comeback as numbers of attacks and targets rise


Long-lasting DDoS attacks made a return in the first quarter of 2018 with the longest attack seen lasting 297 hours (more than 12 days). The last time a longer attack than this occurred was at the end of 2015.
This is among the findings of Kaspersky Lab's latest DDoS intelligence report which reveals that in the first quarter of 2018, DDoS attacks were registered against targets in 79 countries.
Configuration vulnerability could leave SAP systems open to compromise


A vulnerability arising from the default installation of popular business management platform SAP could lead to a full compromise of the system say researchers.
SAP security and compliance specialist Onapsis has revealed the flaw which is found in SAP Netweaver and can be compromised by a remote unauthenticated attacker with only network access to the system.
Exploit emerges for Microsoft's problematic Meltdown patch for Windows 7 and Server 2008


For Microsoft, the patches it produced for the Meltdown chip vulnerability proved to be just about as problematic as the original issue, further reducing the security of systems. Following the emergence of an exploit for the Windows-maker's first patch, users are advised to hurry up and install the patch-for-a-patch that was later released.
Last month, Ulf Frisk from Sweden revealed that Microsoft's Meltdown patches were making things worse for Windows 7 and Windows Server 2008, making it possible to read and write kernel memory and gain total control over the system. Now code has been posted online that can be used to exploit the "Total Meltdown" vulnerability.
North Korean leaders abandon western social media


Chances are you're not currently friends with Kim Jong Un on Facebook. And it's not likely to happen any time soon according to researchers at Recorded Future who have been looking at the internet usage patterns of North Korea's leaders.
In July last year they found that the country's ruling elite were plugged into contemporary internet society, were technologically savvy, and had patterns of internet use that were very similar to users in the West.
Security flaw could allow hackers to create hotel master keys


Most hotel chains these days rely on some sort of electronic key card mechanism rather than more traditional locks.
Researchers at F-Secure have found that hotels worldwide are using an electronic lock system with a flaw that could be exploited by an attacker to gain access to any room in the building.
Endpoints still vulnerable despite advances in protection technology


Although endpoint security solutions have improved, a new survey of IT security professionals finds that three quarters believe their existing anti-malware solutions would be able to prevent no more than 70 percent of infections.
The study from anti-evasion specialist Minerva Labs shows nearly half of the respondents surveyed (48 percent) say that they have seen about the same number of malware infections than previous years while 32 percent claim to have seen an increase in infections.
90 percent of malware given unhelpful labels by AV tools


According to a new study, 90 percent of malicious files are given generic labels by AV tools, such as 'trojan.generic', providing limited guidance for successful remediation and leaving enterprises exposed to subsequent attacks resulting from compromised credentials.
The study by breach protection specialist Lastline analyzed tens of millions of samples that were for the most part scanned and released by other security solutions.
Online banking security improves but only a third are free of critical vulnerabilities


The percentage of critical vulnerabilities in online banking systems is falling, but two thirds still contain at least one critical vulnerability according to a new report.
Enterprise security specialist Positive Technologies has released its Financial Application Vulnerabilities Report, drawn from audits performed by the company.
Martin Lewis suing Facebook over fake ads


We reported just over a week ago that fake ads promoting cryptocurrency scams were using the names of leading UK business figures.
Now one of those whose names has been featured, consumer advice expert Martin Lewis, is suing Facebook for defamation over the use of his face and name.
Google's Project Zero reveals security flaw in Windows 10 S after Microsoft fails to fix it


Details of a security flaw in Windows 10 S have been revealed by Google's Project Zero after Microsoft failed to issue a patch within the 90-day disclosure deadline.
The "WLDP CLSID policy .NET COM Instantiation UMCI Bypass" vulnerability is described as being of medium severity, and it allows for the execution of arbitrary code on systems with Device Guard enabled.
Cybercrime revenues hit $1.5 trillion a year


We reported earlier this month on the ways in which cyber criminals spend their ill-gotten gains.
The company behind those findings, Bromium, has now released more details from its research, which exposes a huge cybercrime-based economy and the professionalization of cybercrime.
Cyber attacks could cause catastrophic failure say 70 percent of energy security pros


A new study looking at industrial control systems (ICS) security in the energy industry reveals a majority of respondents are worried about potentially catastrophic effects from a successful cyber attack.
The study carried out for security and compliance specialist Tripwire by Dimensional Research included 151 IT and operational technology (OT) security professionals at energy and oil and gas companies.
TaskRabbit returns after security breach and reveals 'personally identifiable information' was exposed


The CEO of TaskRabbit has informed users that "certain personally identifiable information may have been compromised" in a security incident that saw the website and app taken offline earlier in the week.
TaskRabbit -- a service that puts "taskers" in touch with people who need help with jobs around the home -- is now back online, and the company is now on a damage limitation exercise, issuing a statement in the name of "trust, openness, and transparency". Stacy Brown-Philpot says that an investigation is still underway to determine what happened, but explains that "preliminary evidence shows that an unauthorized user gained access to our systems".
Honeypot project reveals attackers are turning to automation


Most businesses are seeking to automate the more tedious aspects of their operations and some new research from security analytics platform Cybereason reveals that hackers are no exception.
The company set up a honeypot system masquerading as a financial services company and introduced security flaws in several stages.
Microsoft brings Windows Defender Browser Protection extension to Google Chrome


Recognizing that comparatively few people are using its Edge browser, Microsoft has released a new security tool for those who have opted to use Google Chrome -- the Windows Defender Browser Protection extension.
The add-on offers real-time protection against a variety of online threats such as phishing attacks and malicious websites. As these security options are already available in Chrome, it's not clear quite who the extension is aimed at.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.