endpoint protection

Kaspersky and ESET top the security charts

The way people access the internet is changing, with a shift towards portable devices, and that in turn has led to a shift in the software they use.

Independent testing company AV-Comparatives has conducted its annual survey focusing on which security products (free and paid) are employed by users, along with their OS and browser usage.

By Ian Barker -
Cybercrime scene

The effect of cybercrime on businesses and consumers

Here we are, at the end of the first month of a new year and where are we? Well, I guess that very much depends on who you are. If you're a hacker, then things are looking good for you. If you're a consumer, the evidence suggests you won't be fooled twice, but is that good enough? And if you're a business, you've got the same security problems as last year but with enhanced threats from hackers and careless employees as well as enhanced expectations from consumers.

So, exactly what is happening in today's security world and what does it mean for you?

By Norman Shaw -
The back of a Wi-Fi router with antenna mounted

Vulnerabilities could leave thousands of NETGEAR routers exposed

New vulnerabilities discovered in 31 models of NETGEAR router are reckoned to leave at least 10,000 devices at risk and could affect many more.

Cyber security company Trustwave has released details of the vulnerabilities which allow an attacker to discover or completely bypass any password on a NETGEAR router, giving them complete control of the router, including the ability to change configuration, turn infected routers into botnets or even upload entirely new firmware.

By Ian Barker -
Risk dial

New platform offers holistic risk assessment for enterprises

The proliferation of cloud services and diverse platforms in modern enterprises makes guarding against risk and protecting data a major challenge.

Cyber risk assurance company TechDemocracy is addressing this problem with the launch of a new platform to analyze the effectiveness of existing cyber risk and compliance solutions and offers a consolidated view of enterprise risk posture.

By Ian Barker -
chrome-browser-logo-close-up

Really, Google? Chrome 57 kills the ability to control and disable plugins

With web browsers being among the most frequently used pieces of software out there, it's little wonder that there is so much concern about security surrounding them. Browser plugins can be a major security worry, and with Chrome 57 Google has taken the strange decision to block users from disabling them or changing their settings.

While this is not the same as preventing users from changing the settings for extensions, or removing them, it still has important implications -- particularly if a security problem should be discovered in a plugin Google bundles with Chrome.

By Sofia Elizabella Wyciślik-Wilson -
Warning Sign Sky Cloud Cloudy

Warning: most Android VPN apps are insecure

VPN software can be used to not only circumvent geoblocking, censorship and ISP blocks, but also to remain anonymous online. At least that's the idea. If you're an Android user who has a VPN app installed on your phone or tablet, the chances are that it is not safe.

Research shows that the majority of VPN apps to be found in Google Play contain spyware or malware, leak data, or include tracking components. This is in stark contrast to what most people would expect from such apps, and users are warned to double-check the choice they have made.

By Sofia Elizabella Wyciślik-Wilson -
child_using_computer_keyboard

40 percent of British children use the internet unsupervised

Connected devices are a big part of all our lives and that goes for younger members of the family too, but of course connecting to the internet means risk.

A new survey from Intel Security shows 40 percent of British parents do not keep track of their children's online activity, so they don't know when their children are online or what websites and content they're accessing.

By Ian Barker -
security flaw

Demand for security pros in UK rises by 46 percent

To say that IT security professionals in the UK are in demand would be a severe understatement. A new report by Experis says there has been an increase of 46 percent in the demand for both permanent and contract IT security professionals.

The report, entitled Tech Cities Job Watch, says companies are putting more emphasis on long-term investments.

By Sead Fadilpašić -
confident man

Mid-market enterprises are too confident of their cyber security

Mid-market enterprises have very high confidence in their cyber security defenses, but in reality they struggle to defend against malicious activity which has become more sophisticated, more targeted and more severe.

Security operations-as-a-service company Arctic Wolf Networks along with research firm Vanson Bourne, surveyed IT decision makers at 200 companies with between 500 and 3,000 employees and uncovered a disparity between what IT professionals believe versus the reality of their security posture.

By Ian Barker -
Business security

Security is more important than availability in app development

Security is now the top priority for app development, surpassing availability, a new report by F5 Networks states. The State of Application Delivery report is based on a poll of more than 2,000 IT, networking, application, and security professionals worldwide.

Looking at how they are deploying and managing their applications in a rapidly evolving landscape, the report also says that organizations in the EMEA region (Europe, Middle East, Africa), expect more than three quarters (76 percent) of their apps in the cloud this year.

By Sead Fadilpašić -
facebook_privacy

Here, FIDO! Facebook adds security key protection

Hackers are always keen to get their hands on people's social media accounts, so adding two-factor security is a good way of keeping your login details secure if someone tries to access your account on another device.

Facebook has offered verification by SMS message or mobile app for a while but it's now going a step further by making the FIDO U2F (universal 2nd factor authentication) security key available as part of its login process.

By Ian Barker -
Cyber attack

Cyber attacks fall in volume but grow in sophistication

Cyber criminals are employing more sophisticated techniques in their attacks, including the use of 'false flagging' to disguise their true source.

This is one of the findings of the latest threat intelligence report from NTT Security, on a positive note though it records a 35 percent decrease in the number of attacks in the final quarter of 2016.

By Ian Barker -
Security

Enterprises have the wrong priorities on security spending

A new survey reveals a disconnect between the security solutions organizations spend money on and the ability of those solutions to protect sensitive data.

The study from security solutions company Thales e-Security and 451 Research finds that while 30 percent of respondents classify their organizations as 'very vulnerable' or 'extremely vulnerable' to data attacks the two top spending priorities are network (62 percent) and endpoint (56 percent) protection solutions.

By Ian Barker -
endpoint security

4 big security threats facing your small business

You no longer have to be a large corporation to draw the attention of cybercriminals. In fact, your small business could be appealing to hackers, simply because you don’t have the same level of security that a big firm can bring to bear.

Learning more about the most common risks can help you protect your organization and ensure you don’t fall victim to a scammer.

By Rick Delgado -
Bot net

Bot traffic takes back the web

Just over a year ago we reported that, for the first time in five years, human web traffic had overtaken bot traffic.

It seems, however, that human dominance was short lived. The latest Imperva Incapsula Bot Traffic Report shows that in 2016 the bots were back on top with 51.8 percent of online activity, although it's an increase in good bot activity that has driven the trend.

By Ian Barker -
Load More Articles