Cyber security is more important than Brexit in boardroom talks

Security

Cyber security is a top concern in the boardroom, to the point where it’s a more important issue than Brexit. That's according to a new report from Radware examining the state of cyber security across the US and Europe.

The study shows that in 85 percent of cases security threats are now being discussed on a board level. Almost all of them (94 percent) see cyber security as a top priority, and two thirds (62 percent) see it as "extremely important." This figure is up nine percent, compared to last year.

Continue reading

Unsecured Amazon server leaks details of 198 million American voters

us-election-vote

Personal data and profiling information about millions of American voters has been exposed in what is believed to be the largest ever leak of its kind.

198 million records were found stored on an unsecured Amazon S3 server owned by Deep Root Analytics, a Republican data analytics firm. It is thought that the data, which dates back more than a decade, includes information about every registered American voter.

Continue reading

Ring Video Doorbell 2 is here

Ring_Doorbell_Gen_2

It feels like everything is internet-connected nowadays -- lights, televisions, coffee-makers, and more. Heck, even doorbells are connected! One of the most popular such devices -- the Ring Video Doorbell -- allows the owner to not only see who is ringing the doorbell, but to communicate with them too. This can be done remotely with a smartphone, so even when you aren't home, you can give the illusion that you are. In theory, this could thwart burglars that are testing to see if a home is occupied.

Today, Ring Video Doorbell gets a generation 2 refresh. All of the features of the first-gen model are here, but it gets an improved design with 1080p video support and more.

Continue reading

Microsoft is killing off SMBv1 in Windows 10 to thwart the likes of WannaCry

Black Microsoft shop logo

From the fall, Microsoft is disabling SMBv1 in Windows 10. With the release of Windows 10 Fall Creators Update (or Redstone 3 if you prefer), the protocol that was exploited by the WannaCry ransomware will be no more.

The file sharing protocol was developed by Microsoft over two decades ago, and the company recognizes that the time has come for it to be retired. Internal builds of Windows 10 being tested by Microsoft already have SMBv1 disabled, and similar builds will make their way to Windows Insiders and the wider public in due course.

Continue reading

Unencrypted USB drives putting UK businesses at risk

flash drive and laptop

UK businesses are putting almost no effort into securing the data they keep on USB drives, which is not in line with what GDPR demands, potentially putting them at risk of being hit with huge fines.

That's according to data storage firm Kingston, which concluded after polling 480 employees from companies in various industries.

Continue reading

Malware attacks against UK businesses increase by 500 percent

malware alert

British businesses are being hit by more malware than ever, new research reveals.

In the wake of the huge WannaCry attack last month, an investigation by cybersecurity experts Malwarebytes found that malware incidents faced by UK businesses increased 500 percent year over year.

Continue reading

Cloud security services will be a $5.9bn market in 2017

cloud encryption

Cloud-based security services saw a huge increase during the last 12 months,  according to the latest figures from Gartner.

In a new report, Gartner says cloud-based security services will reach $5.9 billion this year, representing a 21 percent growth compared to the year before.

Continue reading

WikiLeaks Vault 7: CherryBlossom files show CIA can hack D-Link, Belkin and Linksys routers into listening devices

dc-cherry-blossom

Wikileaks has released a batch of documents from the middle of 2012 revealing details of the CIA's CherryBlossom project. A joint venture with the Stanford Research Institute, the CherryBlossom files show how the agency can take remote control of routers and other networking devices from numerous manufacturers, transforming them into listening devices.

CherryBlossom also enables the CIA to interfere with both incoming and outgoing traffic. Passwords present little obstacle in many cases and the fact that remote infection is possible makes the implant very simple to install. The documents reveal how the CIA can home in on a target using information such as MAC address, email address, or even chat handles.

Continue reading

SecureAuth launches improved Office 365 protection

Office protection

Office 365 is the world's most popular cloud service, but widespread use of the platform also makes it a primary target for cyber attacks. Breaches tied to phishing email scams and lack of strong identity security are accelerating.

Adaptive access control specialist SecureAuth is launching a new enhanced security solution aimed at protecting Office 365 from attack by improving authentication.

Continue reading

Threat intelligence fails to deliver on its promise

intelligence fail

A new study by the Information Security Forum (ISF), an independent authority on cyber security and information risk management, reveals that threat intelligence isn't delivering the expected business objectives.

While 82 percent of ISF Members surveyed have a threat intelligence capability, with the remaining 18 percent planning to implement one in the next twelve months, only 25 percent of those surveyed believe their capability is fully delivering.

Continue reading

Attacks on online services cost banks over $1.7 million

bank

A cybersecurity incident involving a bank's online banking services costs the organization $1,754,000 on average, around double the price of recovering from a malware incident.

This is among the findings of Kaspersky Lab's Financial Institutions Security Risks survey released today, which shows that 61 percent of cybersecurity incidents affecting online banking come with additional costs for the institution targeted. These include data loss, loss of brand or company reputation, confidential information leaks, and more.

Continue reading

Enterprise users still relying on weak passwords

weak password

Despite moves towards other methods of verification, most enterprises are still using passwords to secure their systems.

But based on results from its password assessment tool Preempt Inspector, behavioral firewall company Preempt shows that many enterprise users are still relying on compromised or poor quality passwords.

Continue reading

Intelligent chatbot helps boost endpoint security

AI security

It's vital to protect endpoints within the enterprise, but often the level of alerts generated by conventional solutions can prove overwhelming for security analysts.

Cyber security platform Endgame is introducing new features to simplify attack detection, threat hunting, and response, including the use of an intelligent chatbot.

Continue reading

SailPoint brings AI to identity management

Artificial intelligence

Enterprise identity management company SailPoint is using the Navigate '17 event to preview its new identity analytics solution, IdentityAI.

By adding analytics to SailPoint's existing open identity platform it will enable customers to improve their identity governance and mitigate potential threats.

Continue reading

The time to fix IoT security is now

IOT_Internet_of_Things_2017

The Internet of Things has enjoyed a huge surge in growth in recent years, with businesses and consumers alike flocking to get the world around them smarter and more connected.

However, it is becoming quickly apparent that as well as offering a number of useful benefits, the Internet of Things could pose a lucrative opportunity for cyber-criminals able to exploit some potentially major flaws.

Continue reading

Load More Articles