Articles about Security

CyberScout launches one-stop marketplace for identity management

unknown identity

Recent breaches like that at Equifax have highlighted the importance of supporting victims with identity management services in the aftermath of an attack.

Identity and data defense firm CyberScout is launching a comprehensive marketplace for identity management, privacy, and cyber security education products and services, aimed at providing individuals with a one-stop-shop solution for all services relating to cyber protection.

Continue reading

Industrial and infrastructure networks are prime targets for attackers

Cooling towers

Operational technology networks are used with specialized Industrial Control Systems (ICS) to monitor and control physical processes such as assembly lines, mixing tanks, and blast furnaces. These networks are ripe targets for adversaries according to a new study from industrial cyber security company CyberX.

Many of these networks are exposed to the public internet and easy to crack using simple vulnerabilities like plain-text passwords. Lack of even basic protections like antivirus can enable attackers to quietly perform reconnaissance before sabotaging physical processes.

Continue reading

One in three businesses can't keep up with cloud security

cloud net

Maintaining security in the cloud and container environments is an increasing problem according to a new survey.

The study by intrusion detection platform Threat Stack finds that 31 percent of those interviewed say they are unable to maintain security as their cloud and container environments grow. As a result, 62 percent say that they’re seeking greater visibility into their public cloud workloads.

Continue reading

Consumer group Which? calls for amendments to Data Protection Bill to allow for 'collective redress' after breaches

data breach

UK consumer group Which? is calling on the government to make an amendment to the Data Protection Bill that's currently being debated in Parliament. The group is looking for a change in the law that would make it easier for organizations to seek redress for groups of people in the event of a data breach.

Research by Which? suggests that there is confusion surrounding who is responsible for safeguarding data, and little knowledge among consumers about how to go about obtaining compensation.

Continue reading

Google defaults to prompts for two-step authentication

Google prompt two step authentication

Text messages are often used as a means of implementing two-factor authentication on websites and in apps, but now Google is actively pitching its own alternative, known as Google prompt, to customers.

Traditionally users would receive a one-time code on their mobile device contained within a text message which they would have to enter to gain access. With Google's solution though, they will receive a prompt asking if they are trying to sign in. Users trying to sign in will gain access while those not expecting the login prompt will be denied.

Continue reading

Windows 10 Fall Creators Update offers ransomware protection with Controlled Folder Access

Windows-10-Fall-Creators-Update leaves

Ransomware is one of the most concerning, and the most prevalent, forms of malware around at the moment. While there are numerous security tools out there that you can install to keep yourself protected, if you have upgraded to Windows 10 Fall Creators Update you have a built-in tool at your disposal.

Called Controlled Folder Access, the feature locks down files and folders to protect them against unwanted changes -- including encryption by ransomware. It's not enabled by default, so here's what you need to do.

Continue reading

Kaspersky: Increased reliance on mobile devices puts consumers at risk

smartphone security

Smartphone users have been urged to ensure their devices are properly protected against cyber threats, in a new report from one of the world's top security firms.

The latest Kaspersky Cybersecurity Index has warned that over-reliance on mobile devices could be putting consumers around the world at risk as they stop using PCs for many everyday tasks.

Continue reading

New endpoint protection platform guards against nation state attacks

Cyber attack

Endpoint security company Endgame has become the first protection platform that measures its effectiveness not just against malware but against nation-state level attacks.

It has worked with MITRE Corporation to validate protections against MITRE's ATT&CK Matrix, a framework for adversarial tactics and techniques that enterprises encounter daily.

Continue reading

Kaspersky's new 'global transparency initiative' aims to rebuild trust by submitting source code for review

Kaspersky Labs logo

Kaspersky software was recently banned from US government computers over fears that the security company has links to the Russian government. This is something Kaspersky vehemently denies, and now it has announced a new "global transparency initiative" to try to win back trust.

Part of the newly transparent Kaspersky will see the company submitting source code for current and future software to "the broader information-security community and other stakeholders." It is hoping that the scrutiny will put to bed ideas that it has been engaged in espionage with the Russian authorities.

Continue reading

Google says the majority of Chrome traffic is protected with HTTPS

Google Chrome logo

Google has already used Cybersecurity Awareness Month to announced details of a new bug bounty program for Android apps, as well as a new Advanced Protection Program for G Suite users. Now the company has revealed that most web traffic in its Chrome web browser is protected by HTTPS.

The precise figures vary from platform to platform -- with ChromeOS and macOS faring the best -- but between 64 and 75 percent is now secured. Google humblebrags about the results of its mission to "secure the web, one site at a time," after opting to mark non-encrypted pages as being insecure.

Continue reading

One in five UK businesses don't prepare for cyber attacks

business security

UK companies are unprepared for potential cyber-attacks against their business, with major shortcomings in many areas of security, new research has said.

A report released today by PwC found that a worrying amount of British firms only have adequate security protection in place, or are unaware of how best to prepare against attacks.

Continue reading

Financial services to boost security investment on account of breach risks

Security breach lock

Virtually every second global financial services organization was a victim of a data breach sometime in the past, according to a newly released Thales report.

The 2017 Thales Data Threat Report, Financial Edition, says 49 percent of financial services organizations suffered a breach, with a fifth (21 percent) being breached more than once. Nine in ten (90 percent) feel more vulnerable to such incidents.

Continue reading

Microsoft: Identity protection is more important than ever

identity protection

As businesses of all sizes continue to put more and more of their data online, the need to ensure this information remains secure is more pressing than ever.

Microsoft has long been the preferred choice of partner for many companies, with its Microsoft 365 platform offering a comprehensive, and more importantly, secure way to ensure data stays protected. But just exactly what goes in to ensuring millions of enterprises can leave the office each evening feeling assured that their data is safe?

Continue reading

McAfee introduces advanced analytics to protect endpoints and the cloud

endpoint protection

Security teams face ever larger and more complex amounts of data which can hinder their ability to defend against threats.

McAfee is introducing new solutions that make use of the automation, reasoning and data duration provided by advanced analytics technologies, allowing security teams to easily discover and assess data and root out threats.

Continue reading

Microsoft denies that BoundHook vulnerability is actually a vulnerability

code

Security researchers at CyberArk are reporting about a new technique that could be used to take control of Windows 10 devices.

Known as BoundHook, the technique takes advantage of the BOUND hooking technique in Intel MPX (Memory Protection Extensions). But while CyberArk says that it will "bring new capabilities to both software security vendors and malware writers," Microsoft is downplaying the issue, suggesting there is nothing to worry about.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.