laptop woman

How you use your device might serve as a password

Behavioral biometrics, user authentication and malware detection company BioCatch has announced that it has been granted a patent for a new authentication technology through which devices would actually recognize their users by the way they use them.

The patent has been granted by the US Patent Office. It is called Device, system, and method for detecting user identity based on motor control loop model.

By Sead Fadilpašić -
phishing hook

Seagate succumbs to phishing scam: customers should be safe, employees not so much

Companies seem to get compromised on a regular basis and, for the most part, it's security holes in their systems. But user error can also be blamed in some cases -- an errant click on an email attachment can unleash all matter of headaches for an IT department.

Such seems to be the case now with Seagate as reports are emerging of a loss of employee data that came via a phishing scam.

By Alan Buckingham -
pixel padlock

Security is a major concern in the IT industry

Security, and pretty much everything related to security, is the biggest challenge the IT industry is facing nowadays. Those are the results of a new annual research conducted by IT management and innovative security systems provider Shavlik.

The key takeaway point from the report is that 58 percent of IT professionals are more concerned about system security than they were 12 months ago, and we have all the high-profile security breaches that happened recently to thank for that.

By Sead Fadilpašić -
android_security

New security solution protects Android apps throughout their lifecycle

Although mobile apps may be tested for security threats present at the time they're developed, they are of course subject to attacks once they’re out in the world.

Security solutions company SEWORKS is launching a new SaaS-based protection for Android called AppSolid, which will give development teams proactive protection and tracking of their apps across their entire lifespan.

By Ian Barker -
ransomware key

Mac users targeted by KeRanger ransomware -- here's how to remove it

Ransomware is a growing problem, with businesses and individuals increasingly having their data encrypted and held to ransom. As with so many forms of malware, it has been PC users that have borne the brunt of attacks, but over the weekend it was Mac owners that were targeted by the KeRanger ransomware.

The malicious software first appeared on Friday and is said to be the first fully-functional example of ransomware aimed at Apple devices. KeRanger was found to be installed alongside the Transmission BitTorrent client, and while Apple has used its Gatekeeper security system to prevent further infections, if you have installed Transmission 2.90 there are steps you need to take to clean up your system.

Cloud storage

IT pros: Storing data in the cloud is safer than on-premise

IT professionals believe their organization's data is more secure in the cloud than in on-premise machines, a new survey by Evolve IP, entitled 2016 Cloud Adoption suggests.

To be more precise, private clouds are the most popular solution, followed by public clouds, followed by on-premise machines. The survey polled more than 1,080 individuals and has unveiled that 91 percent of all organizations have at least one service in the cloud.

By Sead Fadilpašić -
donald_trump

Anonymous hacks Donald Trump's voicemail and leaks the messages

In the run-up to the presidential election, few days go by when Donald Trump isn't hitting the headlines for something he's said or done. The bombastic billionaire looks set to become the republican candidate, and his journey towards the White House is littered with offense and controversy, and back in December Anonymous declared war on him.

The loose collective of hackers and activist made its declaration after Trump announced plans to ban Muslims from entering the US. One of the alleged first strikes in Anonymous' war sees the group hacking the businessman's voicemail and leaking the messages. The messages appear to show that Trump had a surprisingly cosy relationship with the more left-leaning section of the media than one might imagine.

cheap-iphone4-glass-bottom---w400

While the government searches for an iPhone backdoor, researchers find another way in

While the news about the dispute between Apple and the FBI rages on, security researchers continue to look for other ways into products, not just the iPhone. But as a prominent device it becomes a big target and deserves extra scrutiny.

The security experts from Israel and Australia decided to test out the electromagnetic radiation emitted by devices, in this case using an iPhone. The results were interesting, though they won't help in the case of phones in the custody of law enforcement.

By Alan Buckingham -
password_security_hole

Popular WordPress plugin pulled after discovery of password-stealing backdoor

The precise number of websites out there running on WordPress may not be known, but one thing is for sure -- there are a lot of them. Two reasons for the popularity of WordPress are the ease of set up and the availability of a huge range of plugins. One popular plugin, Custom Content Type Manager (CCTM), has just been pulled from the WordPress Plugin Directory after a backdoor was discovered.

The plugin has been installed on thousands of websites, and a recent update -- automatically installed for many users -- included a worrying payload. In the hands of a new developer, Custom Content Type Manager made changes to core WordPress files, ultimately making it possible to steal admin passwords and transmit them in plaintext to a remote server.

Businessman Suit Fingers Crossed Swear

Amazon values encryption so much that it drops support on Kindle Fire tablets

Amazon has came out in support of encryption, following Apple's recent legal battles with the US government, saying that it "plays a very, very important role" in protecting customer data.

But you might be surprised to learn that Amazon has also decided to quietly drop support for full disk encryption on its Android-based Kindle Fire tablets. Since it is portraying itself as an encryption and consumer advocate, its decision to go in the opposite direction strikes me as sheer hypocrisy.

By Mihăiță Bamburic -
Secure your Apple iCloud account by enabling two-step verification

Yahoo joins the club, throws its support behind Apple against the FBI

For the past couple of weeks the tech news has circled around Apple versus the FBI, after the iPhone maker refused to comply with a court order to unlock a phone used by one of the terrorists in the San Bernardino shootings. That handset may or may not hold data relevant to the case or perhaps reveal plans for future attacks.

We'll possibly never know, given the agency changed the Apple ID and there are claims that even the iPhone maker cannot now get into it. The FBI, for its part, has acknowledged that it made a mistake in changing that ID.

By Alan Buckingham -
Android danger sign

'Accessibility Clickjacking' malware could impact 500 million Android devices

Researchers at threat defense company Skycure have uncovered an Android proof of concept malware that uses accessibility services to allow attackers to spy on and even control a device.

It can monitor all of a victim's activity and allow attackers to read, and possibly compose, corporate emails and documents via the victim's device, as well as elevating their permissions to remotely encrypt or even wipe the device.

By Ian Barker -
Cyber attack

7 things needed for a successful cyber attack

While it is true that pretty much every network is vulnerable to a cyber attack, it is also the case that attackers must follow a certain formula of actions to compromise these systems. Industry research has shown that, on average, advanced attacks nest inside organizations for 200 days before discovery. That’s a long time for an attacker to stealthily gather private data, monitor communications and map the network.

However, once we understand the steps of a successful cyber attack from an attacker’s point of view, then it is possible to, at the very least, shorten the amount of time it takes to detect it; or mitigate it entirely.

By Chris Stoneff -
Hacker

Here are the passwords cybercriminals are most likely to use in hacking attempts

The security group Rapid7 has released a new report that may prompt some alarm from web users who are heedless when it comes to choosing their online passwords.

Instead of using the passwords that internet users are the most likely to pick, the group took a different route and examined the passwords that cybercriminals are actually trying to use to hack into a number of systems including POS systems, kiosks, and computers.

By Anthony Spadafora -
pentagon

Hack the Pentagon!

The Pentagon is to run its own big bounty program, inviting white-hat hackers to test the security of its systems. It is not intended to be a free-for-all, and would-be hackers will be vetted before being given the go-ahead -- although of course there is nothing to stop anyone from trying to breach the defenses if they feel so inclined

The 'Hack the Pentagon' initiative was launched today by Defense Secretary Ash Carter. He said "I am confident that this innovative initiative will strengthen our digital defenses and ultimately enhance our national security". It is to be a carefully managed program which will only be open to US citizens, and networks relating to particularly sensitive material and weapons will be off-limits.

Load More Articles