Articles about Security

Industrial sector attacks jump 91 percent

Cooling towers

A new report from cybersecurity specialist Positive Technologies reveals a reveals a 91 percent jump in attacks on industrial companies and a 54 percent rise in malware-related attacks last year compared to 2019.

The total number of incidents grew by 51 percent compared to 2019. Seven out of 10 attacks were targeted and the most popular targets were government institutions (19 percent), industrial companies (12 percent) and medical institutions (nine percent).

Continue reading

US Amazon customers have a week to opt out of Sidewalk -- here's why you should

You've probably heard of Amazon Sidewalk, the company's home networking system. In fact Sidewalk is a bit more than that, it involves devices like Echo speakers and Ring doorbells becoming part of 'mesh networks'.

These networks will, says Amazon, simplify the process of setting up new devices, keep them online even when out of range of home Wi-Fi, and extend the range of tracking devices. However, customers have only a week to opt out if they don't want their devices to be enrolled in Sidewalk.

Continue reading

Banking fraud rises by more than 150 percent

password theft

A new report from financial crime management platform Feedzai shows that all banking fraud -- combining internet, telephone, and branch attacks -- grew by 159 percent in the first quarter of 2021 compared to the end of 2020.

Based on analysis of over 12 billion global banking transactions from January to March 2021 the study shows online banking made up 96 percent of all banking transactions and accounted for 93 percent of all fraud attempts.

Continue reading

Login experiences are not delivering for consumers

remote work slow broadband

New research by YouGov for identity platform Auth0 finds that many businesses are falling short of consumer expectations on login technologies -- and risk frustrating their users, losing sales, and opening themselves up to credential stuffing attacks as a result.

The study shows that consumers around the world want greater choice in login technologies, and that they're willing to actively seek them out. Nearly half (49 percent) of consumers surveyed say they are more likely to sign up to an app or online service if a company offers multi-factor authentication (MFA).

Continue reading

The challenge of keeping remote work secure

home working security

In a rapid and unprecedented shift, over 60 percent of Americans worked from home in 2020. But this has thrown up new challenges for businesses trying to keep their systems secure.

Authentication specialist Beyond Identity has produced an infographic looking at how vulnerable systems and applications can be in the work from home era.

Continue reading

What does Apple's enterprise growth mean for IT administrators? [Q&A]

Apple logo iMac Pro

The use of Apple devices in the enterprise has grown exponentially over the past year. In fact, a recent report from IDC showed that macOS was the operating system of choice for 23 percent of computers at US companies with 1,000 employees or more in 2020, up from 17 percent in 2019.

As businesses continue to adopt Apple devices at work, Mosyle CEO Alcyr Araujo, wants to highlight how to seamlessly deploy, manage, maintain and protect these devices at scale. He believes simple, intuitive and automated mobile device management (MDM) and endpoint security are the key to solving new endpoint management and security challenges, we spoke to him to find out more.

Continue reading

Why ransomware is on the rise and how organizations can protect themselves [Q&A]

Ransomware skull

Many high profile attacks in recent months have involved ransomware, notably the Colonial Pipeline attack. Worryingly some businesses seem willing to pay the ransoms too.

But why are these attacks on the rise and what can businesses do to protect themselves against them? We spoke to Clumio CEO, Poojan Kumar to find out.

Continue reading

Get 'Network Security Strategies' ($27.99 value) FREE for a limited time

With advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments.

Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats.

Continue reading

Free tool lets businesses assess ransomware preparedness

ransomware laptop

Cyber risk management company Axio is expanding its free Axio360 Ransomware Preparedness Assessment tool to give organizations detailed visibility into their cyber posture with regard to ransomware.

The assessment tool has been developed based on guidance from National Institute of Standards and Technology (NIST), the Department of Homeland Security, the Federal Bureau of Investigation, and Axio's proprietary research based on hundreds of real ransomware events.

Continue reading

Enterprises under-resource cloud security despite increased risks

Secure cloud

A new study from Osterman Research, commissioned by Sonrai Security shows that almost a third of US companies are under-resourcing cloud security in the face of rising threats.

Even though half of respondents have spent $10 million or more on cloud services over the last three years, 32 percent say they are doing less than they need to in order to secure their cloud resources.

Continue reading

New identity platform delivers biometric authentication and enterprise-grade tools

Verification and authentication provider Onfido is launching its Real Identity Platform, which adds a biometric face authenticator as well as new enterprise-grade security tools, including Onfido Private Key Encryption, to its existing identity verification suite.

Onfido Face Authenticate uses 3D Face Liveness Detection AI during user authentication. It's compatible with billions of iOS and Android devices, tablets and PCs.

Continue reading

One Identity introduces modular, integrated, cloud security platform

cloud lock

Security specialist One Identity is launching its Active Roles and Password Manager products in a software-as-a-service format.

Retaining the full capabilities of One Identity's on-premises solutions, the SaaS offerings are hosted, managed and operated within the One Identity Cloud. There's also a new SaaS-delivered solution, Starling CertAccess, which delivers access request and certification Active Directory (AD) and Azure Active Directory (AAD) in the enterprise.

Continue reading

Organizations in India, Austria and the US are most hit by ransomware

Ransomware

More than half of companies in India, Austria and the US experienced ransomware attacks in the past year, compared to a global average of 37 percent.

Data from Atlas VPN, based on research by Sophos, shows that out of 300 interviewees from India, 68 percent suffered from a ransomware attack, while 57 out of 100 respondents from Austria did so.

Continue reading

The encryption technology that's revolutionizing secure data usage [Q&A]

Data encryption

Conventional encryption methods rely on the exchange of keys. This can leave them vulnerable, particularly when they're used on public cloud services.

One way around this is to use homomorphic encryption, this permits third party service providers to perform some types of operations on a user's data without needing to decrypt it.

Continue reading

Attackers spend 11 days in a network before detection

web threats

The median attacker dwell time before detection is 11 days or 256 hours, according to data from Sophos. That's time in which they're free to conduct malicious activity, such as lateral movement, reconnaissance, credential dumping, data exfiltration, and more.

The company has released an 'Active Adversary Playbook' detailing attacker behaviors and the tools, techniques and procedures (TTPs) that Sophos' frontline threat hunters and incident responders saw in the wild in 2020.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.