Gaming helps people cope with lockdown -- but at a cost
A new survey, commissioned by cybersecurity company BullGuard, has revealed that gamers are taking advantage of the social isolation to up their playing time
By doing so, 49 percent say they are alleviating lockdown anxiety, 84 percent are understandably relieving their boredom, while 60 percent are battling it out online to help block out the current situation.
The average password is reused 2.7 times
Despite the fact that credential stuffing using stolen passwords is one of the most common ways of breaching systems, new research from Balbix for this year's World Password Day finds that over 99 percent of employees reuse passwords across work accounts, or between work and personal accounts.
In addition the average password is reused not just once, but 2.7 times, and the average user is sharing eight passwords between all their accounts with 7.5 passwords shared between work and personal accounts.
Hacker group has targeted Asia Pacific governments in five-year campaign
Researchers at Check Point have uncovered a China-based hacker group that has been targeting multiple national Governments in the APAC region over the past five years, to gather political intelligence and conduct espionage.
Targets include Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar and Brunei. After infiltrating one government body, the hacker group uses that body’s contacts, documents and servers to launch targeted phishing attacks against new government targets.
Collaboration between teams helps boost security confidence
Organizations using software to help their IT and information security teams collaborate and align are three times more confident in the effectiveness of their information security efforts according to a new study.
The report from security automation specialist SaltStack shows that 54 percent of InfoSec leaders say they communicate effectively with IT professionals, but only 45 percent of IT professionals agree.
Vulnerabilities allow hackers access to two popular VPNs
New research from VPNpro has found that two of the top 20 premium VPN apps have crucial vulnerabilities that can allow hackers to push fake updates and install malicious programs or steal user data.
The vulnerabilities in PrivateVPN and Betternet, can allow hackers to intercept communications and force the apps to download a fake update. The update may be automatically installed or the user prompted to install it.
Women are better at cybersecurity than men
Women are better at cybersecurity and protecting themselves online, new research by password manager app NordPass suggests.
The survey shows that women are more concerned about the potential harm of their personal online accounts being hacked. They also tend to use unique passwords more often than men.
ESET improves security management for Azure users
As organizations move more of their systems to the cloud, they need security solutions that maintain visibility while keeping them safe.
Cybersecurity company ESET is releasing an upgraded version of its Security Management Center for Microsoft Azure, aimed at providing complete, real-time network visibility.
How mobile data costs compare around the world
If you have a monthly mobile phone plan you may not think too much about the price you pay for mobile data. However, comparison site cable.co.uk has been looking at mobile data costs around the world with some surprising results.
The United States is one of the most expensive developed nations for purchasing mobile data, coming in 188th in the world, with an average 1GB cost of $8.00 -- well above the global average of $5.09.
More than half of cyberattacks infiltrate environments without detection
While organizations continue to invest significant amounts in security controls and assume that this means assets are fully protected, the reality is that a majority of attacks successfully infiltrate production environments without their knowledge.
This is among the findings of a new report from Mandiant Solutions -- the threat intelligence arm of FireEye -- based on real attacks, specific malicious behaviors, and actor-attributed techniques and tactics.
'SideScanning' technology offers deeper multi-cloud visibility
While network scanners and agent-based security tools are commonplace, they come with significant operational costs, but still offer only partial visibility, leaving the organization vulnerable to breaches.
Orca Security has produced a patent pending SideScanning technology, which is based on reading the workloads' run time block storage out of band, and cross-referencing this with cloud context pulled directly from the cloud vendors' APIs.
IBM and Red Hat launch edge computing solutions for the 5G era
The rollout of the 5G network, bringing greater speed and lower latency to mobile data, is going to provide a boost to the utility of edge computing.
The second announcement to come from IBM's virtual Think conference today is a set of new offerings built on Red Hat OpenShift, allowing enterprises to autonomously manage workloads across a massive volume of edge devices.
IBM uses the power of Watson to automate IT operations
Normally at this time of year IBM's annual Think conference would be getting underway. This year's event is, of course, being held digitally and has kicked off with some new announcements.
The first is the unveiling of IBM Watson AIOps, a new offering that uses AI to automate how enterprises self-detect, diagnose and respond to IT anomalies in real time.
New free tool makes it easy to create videos for work and education
The current shift to remote work and distance learning has meant many professionals and teachers communicating for the first time using recorded video.
But the complex steps and costly tools required to capture high-quality presentations are a barrier to them sharing their videos with colleagues and students. Seattle-based Panopto is launching a new, free tool to help people make video presentations by simply visiting a website.
SMBs are ahead of the game on security
It’s a generally held view that smaller businesses are more vulnerable to cyber threats than larger ones but a new report from Cisco Security suggests this may not actually be the case.
In its 2020 SMB Cybersecurity Report the company reveals that SMBs are maturing and mirroring larger organizations' approaches to a variety of security issues, including data breach disclosure, customer data inquiries, threat hunting and more.
How ransomware attacks are making the most of the COVID-19 crisis [Q&A]
Ransomware is a business that's thriving in the current climate, but what's behind this and what wider problems do attacks create for businesses?
We had a socially-distanced chat with Chris Morales, head of security analytics at network detection and response specialist Vectra to find out more.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.