security magnifying glass

New platform can use any data source to gain visibility into attacks

A security breach can involve many different elements, this means that analyzing attacks can be a complex and difficult task.

Security analytics specialist Niara is launching a new version of its security analytics platform that can analyze any data source and supports the customization of behavioral analytics modules, providing organizations with complete visibility into attacks and risky behaviors inside their environments.

By Ian Barker -
google_project_shield

Google's Project Shield protects news and human rights sites from DDoS attacks

The web facilitates free speech, but it also gives groups the opportunity to try to silence those they disagree with. DDoS attacks are common way to retaliate against opposing views, and today Google is expanding Project Shield to protect sites from such attacks.

Project Shield is not a new service, but it has been limited to a group of testers since its launch a few years back. Designed to detect and eliminate "DDoS as a form of censorship" the free service is now available to everyone -- those who qualify, at least. The aim is to protect news and human rights sites to ensure uninterrupted access to news and information.

By Sofia Elizabella Wyciślik-Wilson -
tim-cook

Tim Cook goes off-script describing FBI iPhone backdoor request as 'cancer'

Say what you like about Apple, one thing is for sure -- it is one of the most scripted and tightly-controlled companies in existence. Everything is stage-managed to within an inch of its existence. Leaks about upcoming releases are rare, and there is a tight rein on the media and who has access to its products for review. So when the FBI asked Apple to unlock the iPhone of the San Bernardino shooter it was hardly surprising that the company was a little shaken and unprepared.

This was a media situation Apple was not in control of. Tim Cook has gone on the offensive in recent days, defending his company's decision not to help the FBI, and in a new interview with ABC News the CEO referred to the request to unlock the phone as requiring "software that we view as sort of the equivalent of cancer" -- something of a shocking thing to say when you consider the cause of death of his predecessor, Steve Jobs.

By Sofia Elizabella Wyciślik-Wilson -
Woman looking through magnifying glass

ASUS' routers will be audited for 20 years

Taiwanese hardware manufacturer Asus has agreed to settle Federal Trade Commission charges, the agency reported on Tuesday. Back in 2014, it was discovered that Asus’ routers had poor security protocols, putting hundreds of thousands of users’ data at risk.

Under the settlement, Asus will have to establish and maintain a comprehensive security program, subject to independent audits for the next 20 years. The FTC said the vulnerabilities allowed attackers to gain access to at least 12,900 routers.

By Sead Fadilpašić -
data breach

Majority of data breaches occur in US

There have been 1,673 data breaches last year. They have led to 707 million data records being compromised. Those are the results of a new report by digital security firm Gemalto, entitled Breach Level Index.

The Breach Level Index tracks all data breaches worldwide, looking at their size, severity, as well as the number of records compromised.

By Sead Fadilpašić -
Risk dial

Former employees are a major security threat

If you’re a business owner in the UK, chances are a good portion of your workers are looking for the first opportunity to ditch you.

According to a new report by Ilex International, the identity and access management firm, 59 percent of workers are looking for a new job in 2016. Two reasons are behind this: first that the majority feels underpaid, and the second is that the economy is improving and better prospects are out there.

By Sead Fadilpašić -
Breach detection

CrowdStrike improves ability to combat breaches

Effective cyber security is all about seeing threats and being able to respond to them quickly and effectively. Increasingly this means using the cloud to deliver intelligence.

CrowdStrike, a specialist in cloud-delivered protection, is launching a new version of its Falcon platform to deliver endpoint, detection and response functions along with advanced antivirus capabilities.

By Ian Barker -
Password

Identifying users with behavioral biometrics

As we're regularly being told, passwords on their own are no longer sufficient to ensure our security. Businesses are therefore on the lookout for new ways to identify users without making the sign in process overly complicated.

Adaptive authentication specialist SecureAuth is launching the latest version of its product that includes behavioral biometrics, a new risk analysis technology that performs keystroke analysis and mouse movement analysis to determine a user's legitimacy and build a completely unique behavior-based profile on each user device.

By Ian Barker -
firewall_security

New platform improves efficiency of security operations

Security teams often have to spend a lot of their time investigating incidents, which is time consuming and can distract from other tasks.

To improve the efficiency of security operations centers (SOCs), Israel-based SECDO is launching a new platform aimed at managed security service providers (MSSPs).

By Ian Barker -
Mobile app threats

Enterprises have no protection against mobile malware

Mobile enterprise security firm MobileIron has released its Q4 2015 Mobile Security and Risk Review, discussing the threats and risks that enterprises face in their mobile deployments.

The report reveals the worrying find that more than 50 percent of enterprises have at least one non-compliant device, creating a broader attack surface for malware and data theft.

By Sam Pudwell -
german_trojan

Big Brother ist vatching you: Germany poised to use Trojans to spy on internet users

German intelligence agencies are set to gain greater NSA-style surveillance powers after the German Interior Ministry announced plans to use Trojans to spy on the internet activities of suspects. Known as Bundestrojaner, the Trojan would give the government the ability to not only track which sites a target visits, but also record conversations, make use of webcams, access data and log keystrokes.

The Trojan has been in testing since late last year, and having received governmental approval could now be widely dispatched. Widely described as malware and spyware, the tool cannot be used without a court order, but this will do little to assuage the fears of privacy groups.

By Sofia Elizabella Wyciślik-Wilson -
sad-bill-gates

Bill Gates is wrong

I see something disingenuous about Microsoft cofounder Bill Gates supporting the government's demands that Apple selectively unlock an iPhone used by one of the San Bernardino, Calif. shooters. The former CEO turned philanthropist spoke to the Financial times in an interview posted today. The implications for Microsoft cannot be overstated, and the company's current chief executive should state corporate policy.

Gates' position aligns with the government's: That this case is specific, and isolated, and that the demand would merely provide "access to information". Here's the thing: The interviewer asks Gates if he supports tech companies providing backdoors to their smartphones. The technologist deflects: "Nobody's talking about a backdoor". Media consultants teach publicly-facing officials to offer non-answers exactly like this one. The answer defines the narrative, not the interviewer's question.

By Joe Wilcox -
android_security

New platform helps protect enterprise Android use

Allowing the use of mobile devices and BYOD in the enterprise has led to new challenges for IT teams. Not lease of these is controlling which apps employees can access and how they can use them.

Security solutions provider OptioLabs is launching a new platform that will allow enterprises to create policies that control each of the 3,300 system methods in Android to provide targeted security protections.

By Ian Barker -
Malware virus detected

Endpoint specific malware renders signature detection useless

Signature-based security could be virtually useless as 97 percent of malware is unique to a specific endpoint says a new report.

This is among the findings of the latest annual Webroot Threat Brief which shows that today's threats are truly global and highly dynamic. Many attacks are staged, delivered, and terminated within a matter of hours, or even minutes, having harvested user credentials and other sensitive information.

By Ian Barker -
Doctor

Unsurprisingly, cyber criminals are using the Zika virus to their advantage

The Zika virus has been all over the news lately and people are treating it as if it is something new. In fact, the virus named for the Zika Forest in Uganda, was first discovered way back in 1947. During the time since then, it was isolated to a narrow region near the equator, but several years ago it began to spread, jumping to south Pacific islands and finally landing in Mexico and South America.

Of course, anytime something is making news and playing to people's fears then there are at least two sectors you can count on to try and latch onto it – the media and cyber criminals. Three if you care to lump in politicians, four if you include recent statements from the Pope.

By Alan Buckingham -
Load More Articles