Articles about Security

47 percent of UK teens have been cyber bullied

cyber bullying

According to a new study of 1,000 UK teenagers, 47 percent have been cyber bullied with 70 percent experiencing it on social media and Facebook being the most common platform.

The survey by McAfee reveals part of the problem appears to be that teens are not getting proper guidance at home or at school about staying safe online.

Continue reading

With Android Oreo, Google is introducing Linux kernel requirements

Android may be a Linux-based operating system, but the Linux roots are something that few people pay much mind. Regardless of whether it is known or acknowledged by many people, the fact remains that Android is rooted in software regarded as horrendously difficult to use and most-readily associated with the geekier computer users, but also renowned for its security.

As is easy to tell by comparing versions of Android from different handset manufacturers, developers are -- broadly speaking -- free to do whatever they want with Android, but with Oreo, one aspect of this is changing. Google is introducing a new requirement that OEMs must meet certain requirements when choosing the Linux kernel they use.

Continue reading

Okta adds two-factor authentication

Okta has recently made three major announcements. First, it introduced new developer product toolkit capabilities, allowing developers to add Okta’s identity-driven security solution to their own applications with ease.

This has been announced during Oktane, its user event in Las Vegas. New features include easy and secure authentication, rapid customization and branding, out-of-the-box workflows, as well as securing APIs that are exposed to third-party developers.

Continue reading

30 percent of Americans would leak private data for $1,000

As we carry out more of our day-to-day transactions online, so the amount of information about us that exists out on the internet grows.

That means there are more and more opportunities for data to be leaked or stolen, but a new study by IT staffing company Modis reveals that people still aren't taking their privacy seriously.

Continue reading

The biggest challenges in mobile security

secure payments lock

In the past 20 years, we have seen a boom in mobile adoption and the arrival of the Internet of Things, but recently these advancements have been overshadowed by cybersecurity attacks which have targeted celebrities, the NHS and even the CIA. As a result, concerns for our online and mobile security have sky rocketed for both B2B and B2C customers.

These hackers’ skills are forever evolving, and our ability to stay one step ahead is becoming increasingly difficult, with providers embarking on a never-ending search for ways to stop these attacks. So, what are the current challenges facing the world of mobile security and how can telecoms and Mobile Service Providers (MSPs) overcome them?

Continue reading

DMARC -- rebuilding trust in email [Q&A]

email icon

Email has become the default means of communication for both businesses and individuals, but as we saw yesterday it isn't without its problems.

A major issue email has is that of security, cyber criminals are getting better at creating phishing and other messages that accurately spoof commercial organizations. But there is a technology in the form of Domain-based Message Authentication, Reporting and Conformance (DMARC) which has the potential to restore faith in email communication.

Continue reading

New authentication methods help companies to ditch passwords

Login key

Most people now recognize that passwords alone are flawed as a means of securing systems. The problem is that there are lots of options when it comes to finding a better way of doing things.

Access control specialist SecureAuth is helping the move towards a passwordless world with the introduction of additional multi-factor authentication (MFA) methods, including Link-to-Accept via SMS or email, and YubiKey, the FIDO Universal Second-Factor (U2F) security key by Yubico.

Continue reading

Improving the measurement of cyber threats before they turn into attacks

data threat

Cyber attacks are a major problem for companies and they can be made all the more devastating if a long time elapses before they're discovered.

A new report by the Cloud Security Alliance looks at helping enterprises develop metrics and processes to measure threats before they become cyber attacks.

Continue reading

Google Play Protect branding to be added to certified Android devices

Google Play Protect is the company's latest attempt to prevent Android users from being tricked into installing malware or insecure apps. As an extension of this, Google is introducing a branding program that will see the Google Play Protect logo added to certified Android devices.

The certification of Android phones and tablets is not a new concept -- it's something that Google has been doing for a while. But the new branding on packaging will help buyers identify devices that Google has approved, and it should also encourage more manufacturers to submit their hardware for certification.

Continue reading

New cloud solution allows multi-factor authentication across the enterprise

identity login

Data breaches can often be traced back to weak or stolen credentials, add in a proliferation of systems in the cloud and increasing levels of mobile access, and protecting business systems becomes a major headache.

Independent identity provider Okta is launching its latest cloud-based Okta Adaptive Multi-Factor Authentication (AMFA) that makes two-factor authentication standard for every user.

Continue reading

Intel's 8th-gen processors help deliver secure payments

secure payments lock

Earlier this month we saw Intel launch its new 8th-generation Core processors. As well as improved performance, these chips offer added security with Intel Software Guard Extensions (Intel SGX) technology.

Thanks to a collaboration with authentication specialist Nok Nok Labs (NNL) the new chips with SGX are able to deliver standards-based authentication to enable stronger, simpler, and more secure payments for computer users.

Continue reading

Are you doing enough to address your risk? Here are a seasoned CISO’s fundamentals

Cloud risk

Several years ago, I received an early-morning phone call at home from one of my security staff. Our security operations center had just contacted us, reporting anomalous data traffic. They believed we had several assets that were infected with malware. As I listened to the incident response team triage the event, I thought to myself, "What can I do as a CISO to better protect my organization?"

I had numerous networks and legacy assets under my purview, and even though I had a solid security program, I didn’t feel we were doing enough to address our risk. What fundamentals could I incorporate to better prepare my teams and my security organization?

Continue reading

FBI wants US businesses to stop using Kaspersky software

The FBI has admitted that it is actively discouraging businesses to not use security products from Kaspersky Lab.

Rob Joyce, the US government's Cyber Security Coordinator, said that the agency has been actively trying to convince companies in the private sector to no longer use products from the Russian security firm following a number of recent concerns.

Continue reading

Why are so many organizations struggling to patch? [Q&A]

Patch download

Many recent cyber attacks like WannaCry have succeeded by exploiting vulnerabilities that, although known, have gone widely unpatched.

Why do some organizations find it so difficult to keep their systems up to date and what can they do to better protect themselves? We spoke to Wendy Nather, principal security strategist at Duo Security to find out.

Continue reading

Google Play apps spread malware through advertising SDK

Through the use of an advertising software development kit contained in 500 apps on the Google Play Store, cybercriminals were able to spy on users and even infect their mobile devices with malware.

That's according to security firm Lookout, which discovered that the Android apps in question all had the lgexin ad SDK built into them which gave unauthorized third parties access to user devices.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.