Microsoft delays its February patches for a month

Shocked PC user

For the past several years, Microsoft has released security patches on the second Tuesday of the month -- the so-called Patch Tuesday.

However, Microsoft missed the date this month and now says the new patches won’t arrive until the middle of next month.

Continue reading

Cyber attacks against the UK are increasing

Attack button

The number of cyber attacks launched against the UK has increased significantly with 188 high-level attacks occurring within just the last three months.

The news of the attacks came from Ciaran Martin, chief executive of the National Cyber Security Centre (NCSC), who told the Sunday Times that a number of the attacks were sophisticated enough to threaten national security.

Continue reading

UK tackles attacks with new National Cyber Security Center

Business security

The UK is getting a national center to combat cyber attacks, and it's the Queen who gets to open it. The National Cyber Security Center (NCSC) will reportedly be opened in central London by the Queen, accompanied by The Duke of Edinburgh and Chancellor Philip Hammond.

The NCSC is part of intelligence agency GCHQ and has already tackled 188 attacks in the last three months. It will look for holes in sites belonging to the public sector, will tackle spoof emails and pull phishing sites down.

Continue reading

89 percent of consumers don't pay for mobile malware protection

Mobile fear

A new survey reveals that a large majority of mobile users do not currently pay for malware protection. However, 61 percent say they do want, and are willing to pay for, protection services from their service provider.

The study from security solutions company Allot Communications shows that rather than independently seek out, evaluate and download security apps for each of their mobile devices, consumers would like a one-stop-shop for online protection for themselves and their families. This presents communication service providers (CSPs) with an opportunity to sell an extra service, which many of them are not taking advantage of.

Continue reading

European businesses are not prepared to handle a cyber attack

Cyber attack

More than half of companies in the UK, US and Germany (53 percent) are not prepared to face a cyber-attack. This is according to a new report by specialist insurer Hiscox, which has polled more than 3,000 companies for the report.

The Hiscox Cyber Readiness Report 2017 looks at four areas -- strategy, resourcing, technology and process -- and ranks companies based on such criteria. Most companies score fairly well for technology, but less than a third (30 percent) reach the "expert" score in their overall cyber-readiness.

Continue reading

Logtrust launches real-time integrated threat analytics

Software testing

Big data analytics specialist Logtrust is using RSA to launch a new solution for delivering real-time, integrated threat analytics.

The program enables companies to build solutions that analyze the historical behavior of systems and attackers in order to detect, understand and eliminate potential threats in real-time -- even those that are coming from multiple sources, across multiple devices.

Continue reading

Lavasoft rebrands to adaware, launches antivirus 12

adaware12.200.175

Veteran security vendor Lavasoft has announced that it is rebranding to adaware.

The flagship adaware antivirus was just updated to version 12, gaining a redesigned interface, enhanced protection and faster scans.

Continue reading

Microsoft aims to calm cloud security fears with revamped Trust Center site

microsoft-trust-center

The modern Microsoft places more importance on the cloud than ever before, and this means addressing the security concerns that users might have. As part of this, the company has upgraded and redesigned its Trust Center, home to a wealth of security information.

Designed to provide "support and resources for information professionals, as well as the legal and compliance community," the Trust Center is also of interest to anyone concerned about security in general and those who want to know how Microsoft is complying with laws around the world.

Continue reading

Majority of enterprises use more than 10 mobile business apps

Mobile apps

Almost 80 percent of companies are using more than 10 mobile apps for business, according to a new report.

The third edition of the Mobile Security and Risk Review by MobileIron also finds that 18 percent of companies use Apple's Volume Purchase Program (VPP) to streamline their app deployment.

Continue reading

Why you need extra layers of security for your PC and how to get them for up to 55 percent off

Malwarebytes3.200.175

These days, the threats posed to your PC have never been greater. It’s no longer enough to rely on simple basic anti-malware protection and the built-in Windows firewall. If you want to really close the door to hackers, Trojans and other threats, you need to add multiple layers of security to your computer.

That’s the bad news. Here’s the good news: thanks to the Downloadcrew Software Store, there’s never been a better time to beef up your protection, with great deals for the latest software, from Malwarebytes 3 to Emsisoft Anti-Malware 2017.

Continue reading

IBM brings the power of Watson to cyber security

IBM X-Force Command Centers

The technology industry is having to contend with ever more sophisticated cyber security threats. With a growing shortage of security analysts and masses of data to process this throws more emphasis on the use of AI techniques.

This week at RSA Conference, IBM Security will be demonstrating what the "cognitive security operations center" of the future will look like, including new Watson-powered tools for investigating security events, new services for building these SOCs and breakthrough research that allows customers and analysts to interact with Watson through voice and chat.

Continue reading

Breach analytics platform speeds up incident response

Breach detection

It's increasingly said by experts that data breaches are now a matter of when rather than if. Being able to respond quickly is therefore vital for companies to minimize damage and disruption.

Cybersecurity solutions and breach analytics cloud platform Eastwind Networks is launching an enhanced Breach Analytics Cloud platform to provide complete visibility across the entire attack surface.

Continue reading

Enterprises need to be aware of threats from internal email

Email fraud

Insider attacks are of increasing concern to businesses. New research shows that internal email can be a major source of threats that often gets overlooked.

The study from email security company Mimecast and Forrester Research reveals that more than a third of companies have experienced some information loss, theft, or attack via email within the past two years.

Continue reading

How email filters can improve malware protection

email icon

Spam has been around since the earliest days of email. While many spam messages are poorly written and reek of malicious intent, others are less conspicuous. Cyber-criminals can slyly embed malware and ransomware into emails that can do serious damage if opened.

Fortunately, today’s email filtering systems do an excellent job at finding and isolating these messages. Here we’ll examine the details of email filtering and why they should never be taken for granted.

Continue reading

Hiring a hacker: Why and how you should do it

hiring

The global cost of cybercrime could reach £4.9 trillion annually by 2021, according to a recent report from Cybersecurity Ventures. Cyber crime incidents continue to plague organizations globally, even as businesses pour money into boosting their security.

But how do businesses deal with vulnerabilities they cannot identify? It only takes one smart hacker to discover a backdoor and get access to your sensitive data and systems. Organizations must identify the weaknesses in their cyber security, before -- not after -- they’re exploited by hackers. However, to beat a hacker you’ll need to think like one. Here’s how -- and why -- you should hire a hacker.

Continue reading

Load More Articles