Ian Barker

Gaming helps people cope with lockdown -- but at a cost

gamer

A new survey, commissioned by cybersecurity company BullGuard, has revealed that gamers are taking advantage of the social isolation to up their playing time

By doing so, 49 percent say they are alleviating lockdown anxiety, 84 percent are understandably relieving their boredom, while 60 percent are battling it out online to help block out the current situation.

Continue reading

The average password is reused 2.7 times

Password tweezers

Despite the fact that credential stuffing using stolen passwords is one of the most common ways of breaching systems, new research from Balbix for this year's World Password Day finds that over 99 percent of employees reuse passwords across work accounts, or between work and personal accounts.

In addition the average password is reused not just once, but 2.7 times, and the average user is sharing eight passwords between all their accounts with 7.5 passwords shared between work and personal accounts.

Continue reading

Hacker group has targeted Asia Pacific governments in five-year campaign

Hacker

Researchers at Check Point have uncovered a China-based hacker group that has been targeting multiple national Governments in the APAC region over the past five years, to gather political intelligence and conduct espionage.

Targets include Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar and Brunei. After infiltrating one government body, the hacker group uses that body’s contacts, documents and servers to launch targeted phishing attacks against new government targets.

Continue reading

Collaboration between teams helps boost security confidence

team collaboration

Organizations using software to help their IT and information security teams collaborate and align are three times more confident in the effectiveness of their information security efforts according to a new study.

The report from security automation specialist SaltStack shows that 54 percent of InfoSec leaders say they communicate effectively with IT professionals, but only 45 percent of IT professionals agree.

Continue reading

Vulnerabilities allow hackers access to two popular VPNs

VPN tiles

New research from VPNpro has found that two of the top 20 premium VPN apps have crucial vulnerabilities that can allow hackers to push fake updates and install malicious programs or steal user data.

The vulnerabilities in PrivateVPN and Betternet, can allow hackers to intercept communications and force the apps to download a fake update. The update may be automatically installed or the user prompted to install it.

Continue reading

Women are better at cybersecurity than men

Couple with laptops

Women are better at cybersecurity and protecting themselves online, new research by password manager app NordPass suggests.

The survey shows that women are more concerned about the potential harm of their personal online accounts being hacked. They also tend to use unique passwords more often than men.

Continue reading

ESET improves security management for Azure users

cloud padlock

As organizations move more of their systems to the cloud, they need security solutions that maintain visibility while keeping them safe.

Cybersecurity company ESET is releasing an upgraded version of its Security Management Center for Microsoft Azure, aimed at providing complete, real-time network visibility.

Continue reading

How mobile data costs compare around the world

Mobile cash

If you have a monthly mobile phone plan you may not think too much about the price you pay for mobile data. However, comparison site cable.co.uk has been looking at mobile data costs around the world with some surprising results.

The United States is one of the most expensive developed nations for purchasing mobile data, coming in 188th in the world, with an average 1GB cost of $8.00 -- well above the global average of $5.09.

Continue reading

More than half of cyberattacks infiltrate environments without detection

Attack route

While organizations continue to invest significant amounts in security controls and assume that this means assets are fully protected, the reality is that a majority of attacks successfully infiltrate production environments without their knowledge.

This is among the findings of a new report from Mandiant Solutions -- the threat intelligence arm of FireEye -- based on real attacks, specific malicious behaviors, and actor-attributed techniques and tactics.

Continue reading

'SideScanning' technology offers deeper multi-cloud visibility

Cloud visibilty

While network scanners and agent-based security tools are commonplace, they come with significant operational costs, but still offer only partial visibility, leaving the organization vulnerable to breaches.

Orca Security has produced a patent pending SideScanning technology, which is based on reading the workloads' run time block storage out of band, and cross-referencing this with cloud context pulled directly from the cloud vendors' APIs.

Continue reading

IBM and Red Hat launch edge computing solutions for the 5G era

Edge computing

The rollout of the 5G network, bringing greater speed and lower latency to mobile data, is going to provide a boost to the utility of edge computing.

The second announcement to come from IBM's virtual Think conference today is a set of new offerings built on Red Hat OpenShift, allowing enterprises to autonomously manage workloads across a massive volume of edge devices.

Continue reading

IBM uses the power of Watson to automate IT operations

Automation

Normally at this time of year IBM's annual Think conference would be getting underway. This year's event is, of course, being held digitally and has kicked off with some new announcements.

The first is the unveiling of IBM Watson AIOps, a new offering that uses AI to automate how enterprises self-detect, diagnose and respond to IT anomalies in real time.

Continue reading

New free tool makes it easy to create videos for work and education

Panopto screenshot

The current shift to remote work and distance learning has meant many professionals and teachers communicating for the first time using recorded video.

But the complex steps and costly tools required to capture high-quality presentations are a barrier to them sharing their videos with colleagues and students. Seattle-based Panopto is launching a new, free tool to help people make video presentations by simply visiting a website.

Continue reading

SMBs are ahead of the game on security

security meter

It’s a generally held view that smaller businesses are more vulnerable to cyber threats than larger ones but a new report from Cisco Security suggests this may not actually be the case.

In its 2020 SMB Cybersecurity Report the company reveals that SMBs are maturing and mirroring larger organizations' approaches to a variety of security issues, including data breach disclosure, customer data inquiries, threat hunting and more.

Continue reading

How ransomware attacks are making the most of the COVID-19 crisis [Q&A]

Ransomware

Ransomware is a business that's thriving in the current climate, but what's behind this and what wider problems do attacks create for businesses?

We had a socially-distanced chat with Chris Morales, head of security analytics at network detection and response specialist Vectra to find out more.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.