secure payments lock

How converged endpoint security solutions can counter cybercriminal activity

The ever-changing security landscape, which revolves around advanced and sophisticated threats aimed at data exfiltration and cyber espionage, has spawned a new breed of technologies. They are focused more on detection and response (EDR) rather than antimalware and anti-spyware capabilities, which are addressed by endpoint protection platforms (EPP). The combination of these technologies will set a new standard for security, providing an approach based on the most used and trusted solutions today.

Consequently, security companies have begun incorporating data protection and device management features into legacy EPP solutions, which in 2015 was an estimated $3.2 billion market. This change is an attempt to expand capabilities and tap into a new market that has typically been segregated from traditional security. Conversely, EDR vendors have begun integrating endpoint protection technologies to keep up with the new functionalities added by EPP vendors.

By Liviu Arsene -
Ransomware

Carbon Black launches streaming protection against ransomware

Ransomware remains one of the most serious threats to organizations of all sizes, but traditional signature-based detection methods can struggle to identify the latest attacks.

Endpoint security company Carbon Black is launching its latest Cb Defense next-generation anit virus (NGAV) solution using 'Streaming Ransomware Protection' designed to detect and prevent attacks, even if the ransomware employs fileless techniques or unknown tactics.

By Ian Barker -
Security breach

Poor security design and how not to handle a cyber attack -- lessons from Equifax

The data breach at credit agency Equifax looks to be one of the biggest in recent times. Industry experts have been quick to criticise both the company's security and its response to the breach.

Once again we've seen a breach exploiting a web app vulnerability that has managed to go undetected for several months. There has also been criticism of Equifax executives actions in selling $1 million worth of stock before going public about the breach.

By Ian Barker -
security breach

Researcher finds 'serious' security flaws on HMRC's UK tax site

A security researcher discovered two serious flaws on the HMRC tax website which could have allowed attackers to view, or even edit, tax records. But the researcher, Zemnmez, was astonished not only by the flaws, but also at how hard it was to report them.

In a lengthy blog post entitled "how to hack the uk tax system, i guess," Zemnmez gives details of his findings. He also reveals that it took no fewer than 57 days to successfully report the issues so they could be looked into.

By Sofia Elizabella Wyciślik-Wilson -
School children laptop

US schools are uniquely vulnerable to cyber attacks

A new study by application delivery and security company Radware reveals that US schools are uniquely vulnerable to the threat of cyber attacks.

The study of 1,000 US consumers shows that 15 percent of respondents think a 1-6 grade student easily disrupt school or university operations through a cyber attack, while 57 percent believe the same is true for high school students.

By Ian Barker -
British army

IBM offers free cyber security training to military veterans

We've seen quite a bit recently about the difficulties of recruiting cyber security personnel, and how the skills needed for the role have changed.

In a new initiative, IBM in the UK is teaming up with ex-forces employment specialist SaluteMyJob and non-profit education body the Corsham Institute to offer a free cyber security training course for military veterans.

By Ian Barker -
Hacker

Equifax data breach could be worst ever -- find out here if you are affected by the hack

Data breaches are fairly common nowadays. This is unfortunate, as it exposes sensitive information to evil hackers and other nefarious criminals. Look, people are doing their best to make it through the day -- working long hours and struggling to make ends meet. Then, some computer nerd comes along and adds to life's difficulties by stealing identities. Sigh.

Today, another data breach comes to light, but this time it is particularly bad. In fact, it could quite possibly be the worst such hack in history. You see, credit agency Equifax -- a company you'd expect to be very secure -- had consumer information stolen. Now, it isn't just a handful of people that are affected. No, it is a staggering 143 million consumers in the USA! To make matters worse, it includes the holy grail of personally identifiable information -- social security numbers. Besides SSN, the hackers got birth dates and addresses too. For some of these unfortunate folks, even credit card numbers and driver's license numbers were pilfered.

By Brian Fagioli -
nuclear_bomb

7 tips for wiping your device clean of all data

Most people don't hold onto their mobile devices for very long. New models boasting higher resolution cameras, sharper screens, and an abundance of new features, make buying new and getting rid of the old an annual tradition. However, before you turn it into the carrier for a price rebate, you want to be sure you eliminate all of your personal data first.

If you are selling your device, then you need to take additional precautions, as there may be another consumer utilizing your device and possibly accessing any information that may have been inadvertently left on the device. Mobile devices are built for synchronicity and convenience, so many functions are occurring in the background to offer you a personalized experience. This personalization should be stripped away.

By David Zimmerman -
betanews_image

Security speak: How smart tech can help make your home safer

New technology can be exciting, but it tends to be confusing as well. Those of us who grew up in in the 90s may remember the new fad of installing high-tech security systems with cutting-edge motion sensors and state-of-the art wall panels. Every one of those worked great… for about a week. What began as a flurry of excitement and restful nights quickly turned into a big hassle, as false alarms woke the neighbors, and parents struggled to remember the right key combinations to get things back to normal. After a few short months, those once-exciting upgrades gathered dust, and the home of the future seemed even further from reality.

As you consider making security upgrades to your home today, you might have some reservations due to the technological promises of the past. The good news is that a renaissance of inexpensive technology and consumer-friendly tools has made home security and automation one of the most impactful upgrades you can make for your family.

By Eric Murrell -
Circle2Wired2.resized

Logitech Circle 2 Wired internet security camera gets Apple HomeKit support

Internet of Things devices for the home are becoming extremely popular, but Apple HomeKit, well, isn't. The iPhone-maker's platform for controlling the home hasn't exactly set the world on fire. Slowly but surely, however, device manufacturers are starting to embrace it.

Today, Logitech announces that one of its existing home devices, the Circle 2 Wired security camera, is getting Apple HomeKit compatibility; the wireless variant is not supported at this time. This will allow you to interact with the wired camera using Apple's Home app. It also means Siri support -- a huge convenience.

By Brian Fagioli -
green sound waves oscillating on black background

Hackers can take control of Siri, Cortana and other digital assistants with ultrasonic commands

Security researchers have discovered that digital assistants, including Alexa, Siri and Cortana, are vulnerable to hacking via inaudible voice commands. Known as the DolphinAttack, the exploit involves the use of ultrasonic commands that cannot be heard by humans.

Researchers from China's Zhejiang University have detailed the attack technique in a paper, but there are so many limitations and caveats that the vulnerability is not something that most people need worry about.

By Sofia Elizabella Wyciślik-Wilson -
endpoint protection

SentinelOne's new Deep Visibility capability enhances endpoint protection

When looking to protect their systems from attack most companies focus on the  protection of endpoints, but it can prove hard for admins to gain visibility into individual systems.

Endpoint protection specialist SentinelOne is launching a new Deep Visibility module for its SentinelOne Endpoint Protection Platform, aimed at providing better visibility at all levels.

By Ian Barker -
Developer at work

Samsung pays up to $200,000 in bug bounty program

To improve the security of their products, many high profile tech companies have introduced bug bounty programs. The rewards can be pretty substantial, depending on the severity of the bug and the quality of the report, as Samsung's first such initiative focused on its mobile devices proves.

Called the Mobile Security Rewards Program, Samsung's bug bounty program will pay researchers up to $200,000 for finding security vulnerabilities in its mobile devices and related software.

By Mihăiță Bamburic -
security flaw

Skills required for a cyber security career have changed

As we saw earlier this week, the cyber security industry is looking for new blood in order to solve the skills crisis.

Another study this week by security and compliance firm Tripwire underlines this, with 81 percent of existing security professionals believing that the skills required for the job have changed in the past few years.

By Ian Barker -
immunity infographic header

Why your business is a target for hackers

Although cyber attacks regularly make the headlines, it's easy to fall into the trap of thinking that it can’t happen to your business. You might think that you’re well protected or that you’re too small to worry about.

A new infographic from communications and cloud company CBTS reveals why everyone is potentially at risk.

By Ian Barker -
Load More Articles