Articles about Security

Sophisticated keyloggers target financial services companies


Analysis of malware samples found among finance firms has uncovered an unusually large number of iSpy keylogger samples. iSpy is a variant of the notorious HawkEye logger.

Network-based malware protection specialist Lastline intercepted the logger's communication with the command and control server and detected the active exfiltration of website, email and FTP credentials, as well as license key information for installed products.

Continue reading

Companies are still struggling to secure the cloud

cloud padlock

A new survey from data analytics platform Sumo Logic finds a staggering 98 percent of European companies face organizational challenges implementing security in cloud environments.

The survey of over 300 IT security professionals responsible for environments with significant investment in both cloud and on-premise IT infrastructure covered the US and Canada, and Europe, The Middle East and Africa (EMEA).

Continue reading

44 percent of organizations have suffered a data breach in the last year

data breach

In the last 12 months, 44 percent of organizations have suffered at least one data breach. More worrying is that of those reporting a data breach, the average was almost 30 data breaches per organization in the last year.

This is according to a study from identity management company SailPoint, released at this week's Infosecurity Europe. These breaches cost the organizations nearly $1 million to address from an IT perspective, which excludes fines, lost revenue and brand damage.

Continue reading

Ticketfly remains offline following hack attack in which user data was accessed

Ticketfly hacked

Event ticketing service Ticketfly -- owned by Eventbrite -- has fallen victim to what it describes as a "cyber incident". The company took down its website late on Thursday, and it remains inaccessible two days later.

The full extent of the security breach is not yet known, but Ticketfly says that "some client and customer information" was compromised. The attack saw the site defaced with an Anonymous-style masked figure from the movie V for Vendetta, and the hacker threatened to provide download links to customer databases. A hacker by the name of IShAkDz has claimed responsibility.

Continue reading

Judge dismisses Kaspersky lawsuits about US government software ban

Kaspersky Labs logo

Kaspersky has had something of a tough time of it over the last year, first being hit by a ban on its software being used by the US government, and then a ban on advertising on Twitter. The Russian company sued the Trump administration over the software ban, and a judge has now dismissed the suits.

Kaspersky Lab had been looking to overturn the governmental ban, saying "we've done nothing wrong" in response to claims that the company is linked to the Russian government. The firm says it plans to appeal against the latest ruling.

Continue reading

Bad vibrations: How sound could be used to interfere with your hard drive

Hard drive attack

It's well known that sound at particular levels can cause problems -- we've all seen demonstrations of wine glasses being shattered by high frequencies, for example.

You might not think that's much of an issue for computers, but researchers at the University of Michigan and Zhejiang University in China have shown that sounds can be used to interfere with disks.

Continue reading

Arxan launches new protection solution for Android apps

Android umbrella

Application protection specialist Arxan Technologies is launching its latest Arxan for Android product.

It offers the industry's first protection technology for apps developed using Kotlin, the rapidly growing development language supported by Google for Android app development.

Continue reading

D-Link launches trio of security cameras with Amazon Alexa and Google Assistant support

While Wi-Fi security cameras are a super convenient way to monitor your home, understandably, some people might be nervous to use them. After all, a person's home is meant to be their sanctuary, so privacy is paramount. If a camera gets hacked, your private activities could be exposed. No hardware is 100 percent secure, so to mitigate your risk, you want to buy such cameras from reputable makers, such as Logitech with its excellent "Circle" cameras. You should avoid no-name manufacturers.

Today, a popular and reputable company -- D-Link -- unveils a trio of new Wi-Fi security cameras. They are shockingly affordable, starting at just $59.99. Fans of voice assistants will appreciate the Amazon Alexa and Google Assistant support.

Continue reading

Canada: Bank of Montreal and Simplii Financial hit by hackers

Canadian flag

Over the weekend, the Bank of Montreal and Simplii Financial both issued statements indicating that they had fallen victim to hackers. In the case of Simplii Financial, around 40,000 customer accounts have been affected, but numbers have not been revealed for the Bank of Montreal.

Both banks' statements indicate that they were contacted by "fraudsters" on Sunday, May 27, but it is not clear whether the two incidents relate to the same group.

Continue reading

New consolidated identity system simplifies access to enterprise systems

identity verification

Employee experience platform Sapho is announcing a new identity solution to simplify how employees authenticate into systems and access their data and daily workflows.

Sapho's patent-pending Consolidated Identity system means employees can access what they need from a variety of applications without having to go into each application separately.

Continue reading

Cryptocurrency not a major threat to enterprises say security professionals

Cryptocurrency coins

While 84 percent of security professionals believe cryptocurrencies are here to stay, most don't see them as a major threat to the enterprise, despite the rise in cryptomining attacks.

A study from network protection specialist Lastline shows 45.2 percent think cryptocurrency is a mainstream alternative to conventional currencies, while 38.9 percent think it's a fringe option. 14.5 percent say they would rather collect their salary in cryptocurrency than in a traditional currency.

Continue reading

Contextual access management eliminates passwords

Login key

Enterprise identity provider Okta is launching a new set of contextual access management capabilities that will allow businesses to eliminate passwords.

New Adaptive Single Sign-On (SSO) and enhanced Adaptive Multi-Factor Authentication (MFA) products allow decisions based on signals such as device, IP and geolocation context for smarter, more secure identity and access management.

Continue reading

Facebook asks British users to submit their nudes as protection against revenge porn

Facebook logo on iPhone

Following on from a trial in Australia, Facebook is rolling out anti-revenge porn measures to the UK. In order that it can protect British users from failing victim to revenge porn, the social network is asking them to send in naked photos of themselves.

The basic premise of the idea is: send us nudes, and we'll stop others from seeing them.

Continue reading

Enterprise data increasingly accessed from mobile devices

Business mobile devices

Enterprise users are increasingly authenticating into applications from non-office networks, with a 10 percent increase in the average number of unique networks according to the latest Trusted Access Report from Duo Security.

Duo also found that 43 percent of requests to access protected applications and data came from outside of the corporate office and network. People are logging into applications, networks and systems wherever, and whenever as work hours start to flex to fit different lifestyles, time zones and travel.

Continue reading

The bad password habits we just can't break

Written passwords

Despite a range of alternative authentication technologies, many systems still rely on passwords for their security. But a new study from Dashlane shows we’re still pretty bad at password selection.

The analysts used research from Dr Gang Wang, an assistant professor in the Department of Computer Science at Virginia Tech, which analyzed over 61 million passwords.

Continue reading

© 1998-2018 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.