Business security

ESET launches new enterprise security solutions

Cyber security company ESET is using this week's RSA Conference in San Francisco to launch its new range of enterprise security products.

These include a new ESET Enterprise Inspector, an Endpoint Detection and Response (EDR) solution, and ESET Dynamic Threat Defense, a tool that provides off-premise cloud sandboxing, which leverages machine learning and behavior-based detection to prevent zero-day attacks.

By Ian Barker -
Red and blue security padlock

Thousands of Android apps have built-in crypto keys and passwords

A large number of free Android apps suffer with flaky security because software developers are leaving cryptographic keys embedded and passwords hard-coded.

Speaking at the BSides security conference in San Francisco, software vulnerability analyst Will Dormann revealed how he had found serious security problems in thousands upon thousands of apps. After testing 1.8 million apps, he found almost 20,000 featured built-in passwords and keys, and even when a separate password store was used, user data was still open to attack from simple password crackers.

By Sofia Elizabella Wyciślik-Wilson -
open digital lock

Large scale data breaches provide drive for DevSecOps investments

Breaches related to open source components have grown 50 percent since 2017, and an eye-opening 121 percent since 2014, according to a new survey from open source governance and DevSecOps automation specialist Sonatype.

But the survey finds that those companies with mature DevOps practices are 24 percent more likely to have deployed automated security practices throughout their development lifecycle.

By Ian Barker -
Dragons' Den scam

Star UK business names used to promote cryptocurrency scam

In a classic example of social engineering, well-known names from the BBC's Dragons' Den TV series and others are being used to advertise a cryptocurrency scam.

Websites claiming to offer cryptocurrency investments are using images and false recommendations from prominent individuals including Deborah Meaden and Peter Jones from Dragons' Den, and Martin Lewis, the founder of MoneySavingExpert.com, without their consent.

By Ian Barker -
Updating Android

Is your smartphone lying to you about having the latest Android security updates?

If you thought your Android phone was patched with all of the latest security updates, it might be time to think again. A report by Security Research Labs found that some phone manufacturers were not only failing to deliver security updates, but were hiding this fact from users.

The company found that some devices suffered a "patch gap" whereby manufacturers altered the date reported to Android -- and users -- about when security updates were last installed, without actually installing any patches.

By Sofia Elizabella Wyciślik-Wilson -
Email attack

More than 44 percent of businesses fall victim to email account takeovers

Targeted attacks launched via a compromised account were the most successful email attack vector in the past 12 months according to new research.

The study carried out for email security company Agari by Osterman Research reveals that 44 percent of organizations have been victims of a successful ATO-based attack.

By Ian Barker -
Handshake cloud

Integration of platforms delivers improved vulnerability handling

Security platform Illumio and cloud security and compliance platform Qualys are announcing a new integration that will enable organizations to visualize vulnerabilities across data centers and clouds.

Threat data from the Qualys Cloud Platform is integrated with the Illumio Adaptive Security Platform’s application dependency mapping to show potential attack paths in real time. The integration delivers vulnerability maps, enabling organizations to see connections to vulnerabilities within and between applications.

By Ian Barker -
GCHQ

UK hit Islamic State with 'major offensive cyber-campaign'

The UK surveillance agency, GCHQ, has revealed that it launched cyberattacks on Islamic State. Speaking at the Cyber UK conference, GCHQ director Jeremy Fleming said that it had launched a "major offensive cyber-campaign" against the group.

He said that the attacks helped to stem the output of message from Islamic State (or Daesh) online. While Flemming said that a lot of the operation was "too sensitive to talk about", he was confident that it had been effective in disrupting the group's dissemination of messages.

By Sofia Elizabella Wyciślik-Wilson -
blindfold

Enterprises not prepared for fifth generation cyber threats

A new report reveals that 97 percent of organizations are not prepared for the latest multi-vector, fast-moving, mega-scale Gen V cyber threats targeting businesses.

The 2018 Security Report from Check Point analyses the security threats and attacks that organisations globally are experiencing on their networks. It finds just three percent of enterprises are using threat prevention with cloud and mobile security which protects against large-scale, multi-vector Gen V attacks.

By Ian Barker -
NeuVector

New solution automates Kubernetes security

Kubernetes is one of the most popular container platforms, which means enterprises need fast and decisive responses when security incidents and potential attacks occur within their deployments.

Container security specialist NeuVector is launching an enhanced security solution to protect Kubernetes environments by building on the unique NeuVector run-time security automation, which combines east-west traffic visibility with container process monitoring and vulnerability scanning.

By Ian Barker -
data breach

Over 2.5 billion records stolen or compromised in 2017

Almost 2.6 billion records were stolen, lost or exposed worldwide in 2017, an 88 percent increase over the previous year.

Although data breach incidents decreased by 11 percent, 2017 was the first year publicly disclosed breaches surpassed more than two billion compromised data records since Gemalto began its Breach Level Index in 2013.

By Ian Barker -
data leak tap

Less than half of enterprises are aware of external sharing and DLP policy violations

Visibility and compliance challenges continue to haunt organizations, with only 44 percent of respondents claiming they have visibility into external sharing and DLP policy violations in their cloud application and environments.

The figure comes from a new report produced by cloud access security broker Bitglass which also finds that 85 percent of organizations acknowledge they are unable to identify anomalous behavior across cloud applications.

By Ian Barker -
business security

Infoblox and McAfee enhance partnership for threat protection

Network control company Infoblox is announcing an enhanced partnership with McAfee to offer organizations an increased level of sophisticated threat intelligence, as well as faster response time to combat cyber threats.

Using a combination of behavioral analytics, machine learning and up-to-date threat intelligence data at the DNS layer, the comprehensive solution can identify potentially infected devices and block DNS-based data exfiltration, including zero-day attacks.

By Ian Barker -
insider threat

ZoneFox delivers improved intelligence and risk management to combat insider threats

One of the biggest problems companies face in securing their networks is the number of alerts generated which is why many are turning to AI solutions to cope with the workload.

Scottish company ZoneFox is launching an updated version of its security platform that offers better risk management and enriched insights, further time savings and improved scalability.

By Ian Barker -
Facebook on three smartphones

Facebook launches Data Abuse Bounty with rewards of up to $40,000

With at least 87 million Facebook users affected by the data abuse by Cambridge Analytica, the social network is now on a mission to clean up its image. After rolling out tools, issuing notifications, and testifying in front of Congress, Facebook is launching a new bounty program that rewards people who report instances of data abuse.

The Data Abuse Bounty is a new program that offers from $500 to $40,000, and it aims to clamp down on the misuse of data by app developers. Launched just before Mark Zuckerberg's testimonies this week, it's a clear attempt by Facebook to curry favor.

By Sofia Elizabella Wyciślik-Wilson -
Load More Articles