It feels like everything is internet-connected nowadays -- lights, televisions, coffee-makers, and more. Heck, even doorbells are connected! One of the most popular such devices -- the Ring Video Doorbell -- allows the owner to not only see who is ringing the doorbell, but to communicate with them too. This can be done remotely with a smartphone, so even when you aren't home, you can give the illusion that you are. In theory, this could thwart burglars that are testing to see if a home is occupied.
Today, Ring Video Doorbell gets a generation 2 refresh. All of the features of the first-gen model are here, but it gets an improved design with 1080p video support and more.
From the fall, Microsoft is disabling SMBv1 in Windows 10. With the release of Windows 10 Fall Creators Update (or Redstone 3 if you prefer), the protocol that was exploited by the WannaCry ransomware will be no more.
The file sharing protocol was developed by Microsoft over two decades ago, and the company recognizes that the time has come for it to be retired. Internal builds of Windows 10 being tested by Microsoft already have SMBv1 disabled, and similar builds will make their way to Windows Insiders and the wider public in due course.
UK businesses are putting almost no effort into securing the data they keep on USB drives, which is not in line with what GDPR demands, potentially putting them at risk of being hit with huge fines.
That's according to data storage firm Kingston, which concluded after polling 480 employees from companies in various industries.
British businesses are being hit by more malware than ever, new research reveals.
In the wake of the huge WannaCry attack last month, an investigation by cybersecurity experts Malwarebytes found that malware incidents faced by UK businesses increased 500 percent year over year.
Cloud-based security services saw a huge increase during the last 12 months, according to the latest figures from Gartner.
In a new report, Gartner says cloud-based security services will reach $5.9 billion this year, representing a 21 percent growth compared to the year before.
Wikileaks has released a batch of documents from the middle of 2012 revealing details of the CIA's CherryBlossom project. A joint venture with the Stanford Research Institute, the CherryBlossom files show how the agency can take remote control of routers and other networking devices from numerous manufacturers, transforming them into listening devices.
CherryBlossom also enables the CIA to interfere with both incoming and outgoing traffic. Passwords present little obstacle in many cases and the fact that remote infection is possible makes the implant very simple to install. The documents reveal how the CIA can home in on a target using information such as MAC address, email address, or even chat handles.
Office 365 is the world's most popular cloud service, but widespread use of the platform also makes it a primary target for cyber attacks. Breaches tied to phishing email scams and lack of strong identity security are accelerating.
Adaptive access control specialist SecureAuth is launching a new enhanced security solution aimed at protecting Office 365 from attack by improving authentication.
A new study by the Information Security Forum (ISF), an independent authority on cyber security and information risk management, reveals that threat intelligence isn't delivering the expected business objectives.
While 82 percent of ISF Members surveyed have a threat intelligence capability, with the remaining 18 percent planning to implement one in the next twelve months, only 25 percent of those surveyed believe their capability is fully delivering.
A cybersecurity incident involving a bank's online banking services costs the organization $1,754,000 on average, around double the price of recovering from a malware incident.
This is among the findings of Kaspersky Lab's Financial Institutions Security Risks survey released today, which shows that 61 percent of cybersecurity incidents affecting online banking come with additional costs for the institution targeted. These include data loss, loss of brand or company reputation, confidential information leaks, and more.
Despite moves towards other methods of verification, most enterprises are still using passwords to secure their systems.
But based on results from its password assessment tool Preempt Inspector, behavioral firewall company Preempt shows that many enterprise users are still relying on compromised or poor quality passwords.
It's vital to protect endpoints within the enterprise, but often the level of alerts generated by conventional solutions can prove overwhelming for security analysts.
Cyber security platform Endgame is introducing new features to simplify attack detection, threat hunting, and response, including the use of an intelligent chatbot.
Enterprise identity management company SailPoint is using the Navigate '17 event to preview its new identity analytics solution, IdentityAI.
By adding analytics to SailPoint's existing open identity platform it will enable customers to improve their identity governance and mitigate potential threats.
The Internet of Things has enjoyed a huge surge in growth in recent years, with businesses and consumers alike flocking to get the world around them smarter and more connected.
However, it is becoming quickly apparent that as well as offering a number of useful benefits, the Internet of Things could pose a lucrative opportunity for cyber-criminals able to exploit some potentially major flaws.
Last month Microsoft made the decision to issue a "highly unusual" patch for Windows XP. Despite the fact the operating system has not been supported for some time, the patch was released in an attempt to thwart the WannaCrypt ransomware attacks.
Now, in an even more unusual move, Microsoft has chosen to include Windows XP in this month's Patch Tuesday. Windows Vista is also included in this batch of security updates which Microsoft says should address the "elevated risk of cyberattacks by government organizations."
Following the WannaCry attack last month, ransomware was one of the big topics at the recent Infosecurity Europe event in London.
The worldwide assault woke many businesses and organizations up to the real danger that ransomware poses, but new research has also discovered that the criminals behind such attacks could be gearing up for even bigger attacks soon.