New study by Kaspersky shows computer risks to those over 55

Cybercrime scene

It's probably no great secret that today's older generation has a flock of followers online that they largely do not want, who are trying to con them out of their money. Trying to take advantage of this generation is nothing new. In the past it was done door to door with scams such as "roofers" and "driveway repairmen".

Security company Kaspersky has done a study of internet users aged 55 and older and the results, while unsurprising, aren't particularly good.

Continue reading

Intel Security launches new McAfee lineup harnessing the power of the cloud

cloud lock

As we use more devices to access the internet protecting all of them from the latest threats becomes something of a chore.

Intel Security is addressing this with the launch of a new 2017 range of McAfee security products at the heart of which is a next-generation anti-malware engine that offers more efficient and effective threat detection by offloading analysis to the cloud.

Continue reading

How ransomware threatens government agencies [Q&A]

ransomware key

Ransomware is an increasingly severe threat to all organizations and government agencies are not exempt. The Federal Trade Commission recently labeled ransomware as "among the most troubling cyberthreats".

But why are government agencies such an attractive target and what can they do to combat the threat? We spoke to Andrew Hay, chief information security officer of data security specialist DataGravity to find out.

Continue reading

Big Data and IoT leave businesses more vulnerable to cyber attacks

Attack button

In the next three years, there will be more cyberattacks than there were in the past five, a new report by the Economist Intelligence Unit (EIU) claims -- it points the finger at the growth of IoT.

The report says that out of 200 operators of critical infrastructure worldwide, 80 percent say the proliferation of IoT and Big Data is making them more vulnerable to cyberattacks.

Continue reading

IBM and Carbon Black announce new endpoint security solution

endpoint protection

Addressing endpoint vulnerabilities is a major challenge for businesses, often compounded by a lack of visibility into which devices are being actively exploited.

According to Gartner 99 percent of vulnerabilities exploited are ones that professionals have known about for a year, but have lacked the solutions to address.

Continue reading

Mozilla awards $300,000 to four open source projects

moss-mozilla-open-source

Mozilla's love of open source is nothing new -- just look to the Mozilla Open Source Support (MOSS) program. Loving a philosophy is one thing, but Mozilla has also put its money where its mouth is.

In the third quarter of this year, MOSS awarded more than $300,000 to four projects which it either already supported, or which were aligned with the organization's mission. One of the smallest awards -- $56,000 -- was made to Speech Rule Engine, a text-to-speech style component that makes mathematical and scientific content more accessible.

Continue reading

Mirai botnet code used to launch DDoS attack on Krebs On Security leaks online

ddos_attack

Fears are mounting that there could soon be a rise in large scale DDoS attacks after the source code used to launch the recent crippling attack on Krebs On Security was shared on a hacker forum.

Brian Krebs' website was hit by what has been described as the largest ever DDos attack recently, and the Mirai botnet source code has now been made available for anyone to make use of. The style of attack is particularly interesting as it involves using compromised Internet of Things devices such as webcams and other connected IoT hardware.

Continue reading

EFF asks court to block US from prosecuting security researcher

justice the law

This has been a controversy for quite some time. Companies don't like their flaws exposed, and for the most part researchers have honored this, at least to a reasonable degree. Generally, a period of time is given for the company in question to fix the problem, but if it fails then the issue is made public, somewhat akin to branding the company with a scarlet A.

Now, one researcher is working on a book that will point out common system flaws and how to either fix them or avoid them to begin with.

Continue reading

Apple is smart to enlist hackers and iPhone 7 jailbreakers to secure iOS and macOS

AppleSmartKidGlassesBaby

Apple has historically been very guarded and secretive. While this is still true today, the company has definitely become more open after Steve Job's death. Quite frankly, the fact that there are now public betas for both iOS and macOS is mind-blowing for the Apple faithful. Last month, the company even launched its first bug bounty program! Why did Apple soften its guarded position? It had to. As the technology market advances, and security becomes a bigger focus, it is not possible to catch all bugs and vulnerabilities in house.

While the bug bounty and public betas were very wise moves, the company is apparently taking things a step further. According to Forbes, Apple is enlisting iPhone jailbreakers and other hackers (such as Luca Todesco, Nicholas Allegra and Patrick Wardle) to bolster the security of its products using the aforementioned bug bounty program. In fact, it is rumored to be happening at a secret meeting. If true, is the company smart to trust these people?

Continue reading

Many European businesses can't handle cyber attacks

Cyber attack

A quarter of European companies are completely unprepared for the event of a cyberattack and would be extremely exposed if it happened, a new report by global law firm DLA Piper claims.

The paper also says that almost half of all companies (44 percent) view cyberattacks as a significant risk to their business, which means that a significant portion is aware of the problem yet does nothing. Among companies in Western Europe the number rises to almost a third (31 percent). The Benelux region is by far the worst, with 75 percent of companies being exposed.

Continue reading

FBI Director Comey reports more attempts to access US voter databases

fbi-diector-comey

Back in August we learned of access to US voter registration databases in the states of Arizona and Illinois. After an extensive investigation it was widely believed the attempts had come from Russia, which has a history of attempting to influence votes in foreign nations.

Now Director Comey has once again appeared before congress to give some more bad news. "There have been a variety of scanning activities, which is a preamble for potential intrusion activities, as well as some attempted intrusions at voter registration databases beyond those we knew about in July and August", Comey states.

Continue reading

74 percent of enterprises feel vulnerable to insider threats

insider threat

The shift of systems to the cloud has made enterprise data visible beyond the perimeter of the organization, employees can access it from anywhere, and that has an effect on insider threats.

Data protection company Bitglass has released its report on insider threats in the enterprise, featuring insights from over 500 cyber security professionals on the state of insider data leaks and the tools used to mitigate these threats.

Continue reading

IP shielding enables secure voice and video conferencing

video conference

There's a great deal of emphasis on securing data and email, but essential business communication via voice and video tends to get ignored. Yet these communications are vulnerable, partly because devices constantly release metadata, telling the network where and how to route communications.

To address this, Privacy-as-a-Service platform specialist Dispel is launching a secure voice and video conferencing service, a single application designed to provide enterprises and individuals with impenetrable private communications on their smartphones and mobile devices.

Continue reading

Cellebrite cagily claims it can hack into just about any phone including iPhone 7 and Nougat handsets

hacked-phone

Israeli security firm Cellebrite -- the company said to have helped the FBI access the San Bernadino iPhone -- says that it has the power to break into, and extract data from, just about any phone out there. Speaking with the BBC, the company demonstrated how it can crack the password on a smartphone to access its data.

It said that it was able to extract data from the very latest handsets including Android 7 devices and the iPhone 7. Cellebrite says it works with law enforcement agencies around the world too, and stopped short of saying it refused to work with oppressive regimes. The interview raises some interesting questions.

Continue reading

Does your personality make you more likely to get hacked?

Connected brain

LogMeIn the company behind the LastPass password manager has released the results of a survey looking at consumer psychology, behavior and attitudes when it comes to managing personal passwords.

Among the findings are that 61 percent of respondents use the same or similar passwords across accounts, and 55 percent of them do it even though they understand the risk. Also more than a third (39 percent) create more secure passwords for their personal accounts than their work accounts.

Continue reading

Load More Articles