Articles about Security

datAshur SD is an ultra-secure PIN authenticated USB flash drive with removable microSD storage [Review]

datAshur-SD_Angle-1

Although a lot of people and companies now choose to store their data in the cloud, where it can be accessed from anywhere, USB flash drives remain popular. But what happens if you lose a drive or it gets stolen? All of your personal data could be at risk.

You could secure your data using software, or better yet a hardware solution like the datAshur PRO, from iStorage which protects your files with military grade XTS-AES 256-bit encryption. The problem, of course, with a flash drive is it has a fixed -- and possibly limited -- capacity. Not so the datAshur SD, reviewed here, as this uses microSD cards for storage. If you run out of space, you can take out the full card and drop in a new one.

Continue reading

Get 'Industrial Cybersecurity -- Second Edition' ($51.99 value) FREE for a limited time

Industrial-Cybersecurity-Second-Edition

With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure.

Industrial Cybersecurity -- Second Edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.

Continue reading

The tech devices we worry about the most

Scared_Man_Laptop

Technology is supposed to make our lives easier, but it seems that in many cases it also gives us something else to worry about.

Research by Bespoke Software Development Company has used the online analytics tool Ahrefs to work out which products we're most concerned about being hacked.

Continue reading

Hackers invade British Army's social media accounts

Army Twittwr hack

The British Army confirmed yesterday that its Twitter and YouTube accounts had been breached by hackers.

The Army's YouTube channel was changed to feature videos on cyptocurrency and images of billionaire businessman Elon Musk under the account name ArkInvest, while its official Twitter account was used to re-tweet several posts relating to NFTs and had its name changed a number of times.

Continue reading

Evervault is offering free encryption services to women's health apps

Secure vault

There have been several knock-on effects from the Supreme Court ruling on Roe v Wade, but few people would have predicted a change in app use habits out of fear of criminal proceedings. But this is precisely what has happened as growing numbers of users are concerned about the potential for data stored in apps to be used against them

It's just one of the reasons there has been numerous instances of users either ditching period tracking apps altogether, or switching to options considered to be more secure. Now encryption firm Evervault has offered up another solution, announcing it will offer its encryption services free of charge to women's health apps.

Continue reading

Businesses unprepared to deal with ransomware

Ransomware

Ransomware attacks continue to impact organizations worldwide with high costs, but businesses are still largely unprepared to deal with them.

New data from Arcserve shows half of IT decision makers surveyed by Dimensional Research have been targeted by ransomware, 35 percent report their organizations were asked to pay over $100,000 in ransom payments, and 20 percent were asked to pay between $1 million to $10 million.

Continue reading

Why a people-centric culture is critical to security, growth and transformation [Q&A]

students with laptops

Digital transformation is still very much flavor of the month, and businesses face an increasing level of cyber threats. But what is sometimes overlooked is that these things aren't all about technology.

People are an important part of the equation too, driving change and reacting to events. We spoke to James Harrison, head of UK at Telstra, to find out more about why it's important to build a corporate culture that doesn't neglect the human angle.

Continue reading

Supply chain delays leave enterprises at risk

Risk dial

Continuing global supply chain disruption caused by the pandemic and the war in Ukraine is putting enterprises at increased risk from things like ransomware attacks, according to new research from Citrix.

The survey of 200 UK IT decision makers carried out by OnePoll finds 80 percent of security leaders believe that supply chain issues or delays have put their organization at increased risk from ransomware -- for example, by being unable to replace unsupported hardware.

Continue reading

Almost half of UK organizations now encrypt all their data

Data encryption

The increasing threat of data breaches and ransomware is leading more business to encrypt all of their data according to a new report.

The report, from hardware-encrypted USB drive maker Apricorn, is based on a study of 100 UK IT decision makers carried out by Vanson Bourne and finds 47 percent now require the encryption of all data both at rest and in transit.

Continue reading

NFT marketplace OpenSea confirms customer data leak

OpenSea rainbow logo

Popular NFT marketplace OpenSea has started issuing emails to its users warning them of a leak of customer data.

OpenSea says that an employee of its email delivery vendor, Customer.io, abused their position to access and share email addresses with an unauthorized third party. The company has not given an indication of the number of users affected by the data breach, but has warned of an increased risk of phishing attacks. With the number of active users of OpenSea reported to be around 2 million -- and this does not include people who have just signed up for a newsletter -- the potential impact is huge.

Continue reading

The phishing bait that hooks most victims

phishing keyboard hook

Phishing emails referencing corporate issues and delivery problem notifications are the ones most likely to induce people to click links according to new research.

Data on simulated phishing attacks from Kaspersky's Security Awareness Platform shows emails with these subjects were successful in getting people to click 16 to 18 percent of the time.

Continue reading

Threat of firmware attacks is a growing concern for business

encryption_padlock

New research from HP Wolf Security finds that 80 percent of IT leaders are concerned about their capacity to respond to firmware attacks.

The study shows that 67 percent of IT leaders say protecting against, detecting, and recovering from firmware attacks has become more difficult and time-consuming due to the increase in home working, with 64 percent saying the same of analyzing the security of firmware configuration.

Continue reading

Ransomware becomes increasingly professionalized

Gangsters with cash

The world of ransomware is becoming increasingly professional and it’s easier than ever for new entrants to get into the business.

A new report from Tenable looks at the ransomware ecosystem and how it has become one of the biggest threats to organizations as well as being lucrative for the criminals behind it.

Continue reading

Safeguarding your business in the digital age

DevSecOps

Data is often referred to as 'the new oil' that is now playing a major part in shaping economies the world over. In today’s digital world, around 85 percent of organizations see data as one of their most valuable assets.

Back in 2010, IDC calculated that the world had created around 64.2 zettabytes (ZB) of digital information and Seed Scientific estimates that by 2025, the amount of data generated each day is expected to reach 463 exabytes globally, with a total of 175 zettabytes!

Continue reading

New platform aims to secure 'unmanageable' applications

Security concept

Shadow IT applications acquired without the knowledge of the IT department present problems for businesses as they can create security holes or may not be compliant with industry standards.

The problem isn't going to go away. Gartner reports that shadow IT spending represents 30 percent to 40 percent of the overall IT outlay in large enterprises.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.