Login screen

SaaS solution analyzes user credentials to help prevent data breaches

Data breaches arising from misuse of credentials can often be made worse by users having excessive or inappropriate entitlements.

A new solution from One Identity allows companies to analyze and compare user entitlements, and pinpoint situations where they deviate from the norm and thus pose an elevated risk.

By Ian Barker -
Cyber attack

UK businesses lack necessary security skills and awareness

British firms are putting themselves at risk of being hit by major cyber-attacks such as the WannaCry ransomware due to a lack of proper security skills and awareness, a new government report has warned.

Over two thirds (68 percent) of board members at FTSE 350 businesses have not been trained to deal with major cyber security attacks, according to the latest government cyber health check report, revealed today.

By Michael Moore -
smartphone mobile apps

New solution aims to cut mobile app fraud

One of the ways developers can boost the popularity of their mobile apps is via pay-per-click advertising. But this leaves them open to fraud where bots can be used to generate large numbers of hits.

Mobile advertising technology firm AppLift is launching a new Fraud Buster tool, which combats app install fraud in real time to ensure users are genuine and deliver increased return on advertising spending.

By Ian Barker -
Security

Cyber-security is an investment, not a burden

CEOs across the UK are increasingly seeing cyber-security not as a burden, but rather an investment opportunity, a new study has claimed.

The KPMG CEO Outlook 2017 report, based on a poll of 150 CEOs in the UK, found that 70 percent considered investing in cyber-security an opportunity to find new streams of revenue.

By Sead Fadilpašić -
Hacking Inner Car Systems

Hackers can disable your car's safety systems

Hackers could disable a modern car's airbags and other safety systems, putting the driver and the passengers at grave risk, according to a new warning.

Researchers from security firm Trend Micro have revealed a flaw that could allow the controlling network of a connected car to be overloaded, allowing possible hackers to compromise key systems in the vehicle, including safety aspects.

By Sead Fadilpašić -
Network security

How network segmentation can help contain cyber attacks

Cyber crime continues to be a major problem globally and companies are seeking new ways of combating it.

However, there are some older technologies that remain an effective defense. One of these is network segmentation, and network security specialist Tufin Technologies has produced an infographic explaining how segmentation works and how it can help keep organizations secure from today’s sophisticated cyber attacks.

By Ian Barker -
open digital lock

Data leak exposes 1.8 million US voters' private information

A supplier of US voting machines has confirmed a major data leak that has seen the details of more than 1.8 million voters in the state of Illinois exposed.

The leaked data includes full names, addresses, dates of birth, social security numbers (albeit partial), as well as party affiliations. In some cases even ID numbers and driver license numbers were exposed.

By Sead Fadilpašić -
hbo-hacked

Hackers share HBO social media passwords and threaten to leak Game of Thrones S07E07

A few days ago, HBO's latest humiliation was to have its social media accounts taken over by hackers, and the bad news just keeps on coming for the network. The "Mr Smith group" behind the huge data breach that has seen endless Game of Thrones leaks contacted Mashable with the login details for many HBO social media accounts.

On top of this, the group is also threatening to release Game of Thrones S07E07 -- but considering the number of episodes that have leaked from this season, this was to be expected.

By Sofia Elizabella Wyciślik-Wilson -
DevOps

IT professionals need more security training for DevOps

New research has revealed that software developers are not receiving the training necessary to be successful at DevOps in their current positions.

According to the 2017 DevSecOps Global Skills Survey sponsored by Veracode and DevOps.com, 65 percent of DevOps professionals believe that knowledge of DevOps is essential when starting a career in IT. However, 70 percent believe that they did not receive the necessary training through formal education to be successful in today's DevSecOps world, which integrates security into the development and testing of software.

By Anthony Spadafora -
kaspersky-mobile

Kaspersky Secure Connection VPN service is free, but Android users aren't happy with the permissions it requires

In a time when people are more concerned about privacy than ever, security tools such as VPNs are proving increasingly popular. Kaspersky Lab recently released a VPN tool for Android, and reviewers are voicing concerns about the permissions required by the app.

Kaspersky Secure Connection: VPN service has a reasonable overall review score at time of writing, but the lower scores are highly critical of what are seen as privacy-invading permission requirements.

By Sofia Elizabella Wyciślik-Wilson -
identity login

Push authentication can replace the password

For a vestige of the past, the password has managed to hold on and remain alive -- even though some of the top people in computing said that it had already died over a decade ago. In one of his more famous predictions, Microsoft founder Bill Gates said that passwords were on the way out already in 2004. Problem is that Gates, for all his wisdom, didn’t tell us what to use to replace passwords.

"There is no doubt that over time, people are going to rely less and less on passwords," Gates said at the RSA conference in 2004. "People use the same password on different systems, they write them down and they just don't meet the challenge for anything you really want to secure." How prescient he was, it turns out. There were hackers back in 2004, but hacking was nothing like the major international industry it is today -- responsible for tens of billions in losses every year, and endangering businesses large and small.

By Raz Rafaeli -
ransomware key

Ransomware attacks almost double in first half of 2017

The percentage of ransomware attacks almost doubled in the first half of 2017 compared to the first half of 2016, from an average of 26 percent to an average of 48 percent of the main attack categories worldwide.

This is according to a mid-year cyber attack trends report from threat prevention company Check Point. It also finds that 23.5 percent of organizations were impacted by the RoughTed malvertising campaign, and 19.7 percent of organizations were impacted by the Fireball malware over the same period.

By Ian Barker -
Network security

PowerPoint vulnerability enables malware spreading

Researchers have discovered that cyber attackers are exploiting a vulnerability that allows them to elude antivirus software to deliver malware via Microsoft PowerPoint.

The flaw itself exists in the Windows Object Linking and Embedding (OLE) interface and attackers have previously used it to deliver infected Rich Text File (.RTF) documents. Trend Micro's researchers noticed that attackers have now infected PowerPoint files to deliver malicious code.

By Anthony Spadafora -
backdoor

72 percent of security pros say encryption backdoors won't stop terrorism

A new survey of information security professionals carried out at last month's Black Hat conference suggests that the majority think encryption backdoors are ineffective and potentially dangerous.

The study carried out by machine identity protection company Venafi finds that 72 percent of respondents don't believe encryption backdoors would make their nations safer from terrorists.

By Ian Barker -
steal_data_malware

Malware attacks rising thanks to leaked exploits

Malware threats have reached dangerously high levels, according to a new report that highlights the sheer scale of threats facing businesses today.

The latest Kaspersky Lab Malware report, covering the three months of Q2 2017, claims that Kaspersky Lab's products blocked more than five million attacks involving exploits in this time period.

By Michael Moore -
Load More Articles