Think you can spot a phishing email? Think again
People may not be as good as they think they are at spotting phishing scams, according to researchers at the Missouri University of Science and Technology.
Dr Casey Canfield, Missouri S&T assistant professor of engineering management and systems engineering, worked with Carnegie Mellon University colleagues Baruch Fischhoff and Alex Davis on the study, which measures how well people’s confidence in their ability to detect phishing matches with reality.
One year on from the Facebook data breach -- what has changed? [Q&A]
One year ago this week Facebook suffered a massive data breach that prompted the company to reset access for around 90 million accounts.
A year on from this event what has been done to make users' data more secure and are people becoming more aware of the risks to their privacy from using social networks and other sites? We spoke to Fouad Khalil VP of compliance at SecurityScorecard to discuss these things and more.
Poor incident response costs business time and money
Inefficient incident response to email attacks is costing businesses billions in losses every year. For many organizations, finding, identifying and removing email threats is a slow and manual process that takes too long and uses too many resources.
Research from Barracuda Networks finds that that, on average, a business takes three and a half hours to remediate an attack, and 11 percent of organizations spend more than six hours on investigation and remediation.
New tool gives businesses greater control and visibility of customer data
Consumers are becoming more aware of how valuable their personal data is to businesses, in return for this information they expect customized, relevant online experiences.
From the business side this means ensuring that data is held in line with the law, internal policies and customer preferences. Data infrastructure company Segment is launching a new tool to help businesses with this privacy management.
Two thirds of consumers don't think government encryption backdoors will protect them from terrorists
A new survey by machine identity protection company Venafi shows consumers don't trust major cyber security policies pushed by their governments.
Government officials in nearly every country believe the security risks inherent in government-mandated encryption backdoors are less important than giving law enforcement broad access to encrypted personal data. However, US and European consumers overwhelmingly disagree. When asked if laws allowing governments to access encrypted personal and private data would make them safer from terrorists 64 percent don’t agree.
BullGuard launches new internet security range
BullGuard is launching its range of 2020 security products which include a new Secure Browser and machine learning capabilities.
The 2020 product suite also now enables direct integration with BullGuard VPN to ensure users' privacy when connecting to public Wi-Fi.
Insurance companies face online fraud threats
Increasing numbers of people are using digital platforms when engaging with their insurers and this opens up the industry to a range of new fraud challenges.
A new report from TransUnion and iovation identifies 9.14 percent of online insurance transactions as risky, compared to just over five percent across all industries.
Retailers remain a top target for cyberattacks
US retailers are under siege as nearly two thirds (62 percent) report experiencing a data breach and over a third (37 percent) say they were breached in the past year, according to the latest report produced by IDC for Thales.
This high rate of data breaches comes amidst a decline in the rate of growth in security spending. Less than two thirds (62 percent) say that they are increasing spending this year compared to 84 percent last year, yet nearly all (96 percent) of the retailers surveyed claimed they use sensitive data within digitally transformative environments.
85 percent of employees don't get the resources they need on starting a new job
Only 15 percent of employees have all the resources they require to be productive on day one according to a new report from Ivanti.
When it comes to employee onboarding, 38 percent of IT professionals report it takes between two and four days to get a new employee everything they need to do their job, while 27 percent say accomplishing this goal can take more than a week.
The top vulnerabilities in enterprise ransomware attacks
A new report from vulnerability management company RiskSense looks at the most common vulnerabilities used across multiple families of ransomware that target enterprises and government organizations.
Among its key findings are that almost 65 percent target high-value assets like servers, close to 55 percent have CVSS v2 scores lower than eight, nearly 35 percent are old (from 2015 or earlier), and the vulnerabilities used in WannaCry are still being used today.
Why we get hooked by phishing attacks
What makes us click on phishing links? A new study from Webroot has surveyed 4,000 office professionals from the US, UK, Japan and Australia to find out.
While a majority (79 percent) of people report being able to distinguish a phishing message from a genuine one, 49 percent also admit to having clicked on a link from an unknown sender while at work.
'Why am I right for the CISO job? Well, we had a massive data breach...'
A new study from Optiv Security shows that 58 percent of CISOs think experiencing a data breach makes them more attractive to potential employers.
The survey results show a fundamental change in how senior executives and board members perceive cybersecurity, with 96 percent agreeing that senior executives have a better understanding than they did five years ago.
Network-based solution offers SMBs enterprise-class security
A new network-based internet security solution from Comcast is specifically engineered to help small businesses effectively manage the growing risk of cyberattacks.
Comcast Business SecurityEdge works to protect devices connected to a business' Wi-Fi network against existing and emerging internet-related threats, including malware, ransomware, phishing and botnet infections, without requiring additional hardware or software beyond the Comcast Business Internet modem.
New collaboration paves the way for Artificial General Intelligence
The concept of Artificial General Intelligence (AGI) that is able to carry out tasks and understand the world in the way that humans do has been around since 2005 when it was first mooted by Dr Ben Goertzel and Cassio Pennachin in their book Artificial General Intelligence.
A new collaboration between network specialist Cisco and AI company SingularityNET brings practical AGI a step closer, with a commitment to developing applied technologies and customer solutions.
Mainframes are a critical element for new technologies like AI and blockchain
The death of the mainframe is something that's been widely predicted since the 1990s, but these big guns of the computing world stubbornly refuse to succumb.
New research carried out by Forrester for hybrid services provider Ensono and IT consultancy Wipro shows that 50 percent of organizations will continue with and increase mainframe use in the next two years versus just five percent planning to decrease or remove mainframe activity.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.