A quarter of UK healthcare IT pros not confident in response to cyber attacks
According to a new report, one in four UK healthcare IT professionals aren't confident in their organization's ability to respond to cyber attacks.
Research from network intelligence company Infoblox finds that disruption caused to the NHS by WannaCry in May 2017 means many healthcare organizations are preparing themselves for further ransomware attacks.
Survey highlights disconnect between security expectations and reality
A new survey of IT decision makers shows that 89 percent are confident their organizations are in a good position to protect themselves from attacks, but four out of 10 are not taking steps to lock down information, putting themselves at risk of data loss.
The study from security software company Varonis polled 500 IT decision makers in the UK, Germany, France and the US. Fifty-four percent of respondents believe their company will face a major attack in the next year.
New container firewall solution speeds up enterprise integration
Containerization is increasingly a part of enterprise IT strategy, and like any other systems it needs to be properly secured.
Container security specialist NeuVector is releasing a new version of its container firewall security solution with key security, integration, and UI additions, along with a version aimed specifically at enterprises.
US government uses Texas shooter's iPhone to support its case for encryption backdoors
The inability of law enforcement agencies to access encrypted data stored on smartphones is a relatively new one, but it's one that really came into the spotlight with the San Bernardino shooting latest year. With the recent shooting in Texas, the US government is talking about the issue once again.
We've already learned that the FBI has been unable to access data stored on the shooter's phone due to the fact that it's encrypted. We also know that Apple has been in contact with the FBI to offer help -- despite having previously said there was no way it could access encrypted data. Now it seems that the US government, specifically Deputy Attorney General Rod Rosenstein, is using the case to add pressure to phone manufacturers to include backdoors.
WikiLeaks: CIA source code leak shows agency impersonating Kaspersky
Following on from its Vault 7 series of leaks relating to CIA hacking tools, WikiLeaks has kicked off a new series -- Vault 8. The purpose of this latest series is to reveal the source code of previously exposed hacking and surveillance tools, and the first release relates to Hive.
The tool itself is interesting enough, serving as backbone to the CIA's malware operations, but there's more. What's intriguing about the first leak in the Vault 8 series is that it seems to show the agency impersonating Kaspersky, by making use of a fake certificate for the anti-virus company.
Facebook explains its creepy-sounding anti-revenge porn plan
Facebook has revealed more details about how its test program for combating revenge porn works. The social network has been trialing a system which allows users to upload naked images of themselves to Facebook so the company can look out for and block others from sharing them.
People were rather shocked at this idea, but even more so when it transpired that the uploaded nudes would be reviewed by Facebook employees. Keen to calm the storm that has whipped up around the issue, Facebook's global head of safety, Antigone Davis, has penned a blog post explaining that "we want to be clear about how it works."
Microsoft brings Windows Defender Advanced Threat Protection to macOS, Linux, iOS, and Android
Microsoft has announced that it is teaming up with Bitdefender, Lookout, and Ziften to expand the reach of Windows Defender Advanced Threat Protection (ATP). By partnering with the three major security firms, Microsoft is set to bring ATP to macOS, Linux, iOS, and Android devices.
Bitdefender, Lookout, and Ziften will all feed threat detection information into one central resource, and this can then be used by security teams to keep an eye on all threats in a single location.
Comodo launches free service to remove website malware
Many recent security breaches have been caused by poor website safety, allowing hackers to exploit vulnerabilities to steal data.
Cyber security company Comodo is launching a free malware removal service for websites to help businesses stay secure. Once a business submits a request Comodo's security operations center analysts will instantly remove all malware, perform hack repairs, including checking the files, databases and any malicious code running to remove infection from the site, and keep the customer fully updated.
Apple has already contacted the FBI with help to access the Texas shooter's phone
Following the shooting at the weekend in a Texan church, the FBI revealed that it was unable to access the encrypted phone belonging to the gunman, Devin Patrick Kelley. While the FBI said that it did not want to reveal any specific details of the phone, it was widely believed to be an iPhone -- and now Apple has revealed that it has already been in contact with the agency.
The iPhone-maker says that it got in touch with the FBI "immediately" to offer help in accessing the gunman's phone.
FBI can't access data on Texas shooter's encrypted phone
With echoes of the San Bernardino shooting from a couple of years ago, the FBI has revealed that it is unable to break the encryption on the phone belonging to Devin Patrick Kelley, the gunman who killed 26 people in Texas at the weekend.
The agency has not said what make or model of phone they are not able to access, and this is information that will not be revealed -- and for very good reason, says the FBI. Despite the agency's desire for secrecy, there is strong speculation that the device is an iPhone.
Facebook: send nudes and we'll protect you against revenge porn
Revenge porn is one of the latest online problems, and it's one to which it would seem difficult to come up with a solution. Facebook, however, thinks it has the answer. If you're willing to share your nude photos with the social network, it will use them to protect you against revenge porn attacks.
It's an idea that sounds like utter madness, but Facebook is at pains to convince users that it's actually a brilliant solution. Compromising images that are shared with Facebook will be hashed to create a digital fingerprint which the company can then use to identify the same images if they are uploaded by someone else.
Enterprises are risking an IoT technology time bomb
The increased use of connected devices leads to significant security challenges for 77 percent of enterprises, according to a new survey.
The study conducted by Forrester for IoT security company ForeScout Technologies also reveals that 82 percent struggle to identify all of their network-connected devices, and when asked who is primarily responsible for securing IoT, IT and line of business (LoB), leaders don't have a clear answer or measure of ownership.
90 percent of IT pros worry about public cloud security
New research commissioned by network testing, visibility, and security vendor Ixia reveals that more than 90 percent of respondents are concerned about data and application security in public clouds.
In addition nearly 60 percent report that public cloud environments make it more difficult to obtain visibility into data traffic.
New endpoint protection platform aims to stop targeted attacks
Increasingly attacks against businesses and government organizations are targeted against a specific entity.
The latest platform from endpoint protection specialist Endgame uses enhanced attack mapping and automated guidance to empower users of any skill level to stop even the most aggressive attacks.
More than seven billion records exposed in 2017 data breaches
The first three quarters of 2017 have seen 3,833 breaches reported, exposing over seven billion records, according to a new report.
But the study by Risk Based Security reveals that 78.5 percent of all records exposed came from just five breaches. Compared to the same period in 2016, the number of reported breaches is up 18.2 percent and the number of exposed records is up 305 percent.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.