IBM extends its commitment to open hardware
IBM has used the Linux Foundation Open Source Summit today to announce that it will contribute key technologies to the open community.
The company is opening up the POWER Instruction Set Architecture (ISA), the definitions developers use for ensuring that hardware and software work together on POWER.
Almost a third of healthcare workers haven't had cybersecurity training
Because of the volumes and types of data that it holds the healthcare industry is a prime target for cybercriminals.
So it's a little concerning that a new survey of healthcare staff from Kaspersky shows 32 percent of respondents in North America say that they have never received cybersecurity training from their workplace.
Thycotic launches automated solution for managing service accounts
Service accounts are specialized non-human accounts used by applications or other services to access data and network resources to perform specific tasks.
Because they tend to be set and then forgotten they often slip under the radar of conventional account management processes. Privileged access management specialist Thycotic is launching a new Account Lifecycle Manager to automate the management of these accounts.
Deception technology speeds up detection of attacks
Users of deception technology report a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network.
New research for Attivo Networks carried out by Enterprise Management Associates suggests attacker dwell times can be as low as 5.5 days with deception in use compared to an average of 78 to 100 days for those not using the technology.
Over 3,800 data breaches reported in the first half of 2019
2019 is on track to be another 'worst on record' year for data breaches according to a new report from Risk Based Security which finds the number of reported breaches has gone up by 54 percent and the number of exposed records by 52 percent compared to the first six months of 2018.
It shows 3,813 breaches have been reported in the first six months of 2019, exposing more than 4.1 billion records. Eight breaches alone have exposed over 3.2 billion records, 78.6 percent of the total, between them.
Executives believe AI will help businesses cope with changing environments
A new study by management consultancy AT Kearney reveals that confidence is growing among C-suite executives that technology will help businesses navigate a complex and rapidly changing environment.
In an age of increasing automation and artificial intelligence (AI), leaders recognize the differentiating role of non-technical and interpersonal skills such as creativity and leadership -- skills that are not only difficult to find but also expected to become even more important. 42 percent for example say that creativity and innovation skills are hard to find.
60 percent of UK consumers not happy with their data being used for analytics
Customers are more worried than ever about the way their data is used and shared by companies, particularly for analytics, according to a new report.
The Customer State of Mind survey from data protection specialist Trūata shows 60 percent of UK customers are uneasy with companies using their personal data for analytics. Recent high-profile data leaks have also added to this negative perception of the way personal data is managed by brands.
Norman the Cryptominer uses sophisticated techniques to avoid discovery
Researchers at Varonis have released information on a new cryptominer variant, which the team has dubbed 'Norman', that uses various techniques to hide and avoid discovery.
Norman was discovered during investigations of an ongoing cryptomining infection that had spread to nearly every device at a midsize company.
Education is top target for cyberattacks
The education sector has become one of the most sought after targets for cybercriminals, according to the latest report from Malwarebytes Labs.
In the first half of 2019, the top three largest categories of threats identified among education institutions' devices are adware (43 percent), Trojans (25 percent) and backdoors (three percent). However, ransomware dropped to less than one percent in this period -- though it was higher both before and after the study.
Free VPN apps pose a privacy risk on both Android and iOS
Both Apple and Google are allowing numerous potentially unsafe free VPN apps to remain in their app stores, despite being aware of privacy risks according to research from Top10VPN.com.
Among the string of serious privacy issues uncovered but not acted upon is the discovery that nearly 60 percent of the most popular free VPN apps are secretly Chinese-owned.
British Airways e-ticketing leaves passengers' sensitive data at risk
Less than a year on from a breach which exposed the details of hundreds of thousands of customers, British Airways systems are still leaving passengers' personal information at risk.
New research from mobile security provider Wandera has discovered an e-ticketing system vulnerability that leaves passengers' personally identifiable information (PII) exposed.
Connectivity could make digital cameras vulnerable to ransomware
Modern digital cameras with wireless and USB capabilities could be vulnerable to ransomware and malware attacks, enabling attackers to hold precious photos and videos to ransom.
Check Point Research reveals that the standardized protocol known as Picture Transfer Protocol (PTP) used to transfer digital images from camera to PC has critical vulnerabilities.
Almost half of employees have access to more data than they need
A new study of over 700 full-time US employees reveals that that 48 percent of employees have access to more company data than they need to perform their jobs, while 12 percent of employees say they have access to all company data.
The survey by business app marketplace GetApp also asked employees what classifications of data protection are in place at their company. No more than a third of businesses were found to use any one individual data classification.
Load balancer flaw could lead to major breaches at large organizations
A security flaw in the F5 Networks’ BIG-IP load balancer, which is popular among governments, banks, and other large corporations, could be exploited to allow network access.
F-Secure senior security consultant Christoffer Jerkeby has discovered the issue in the Tcl programming language that BIG-IP's iRules (the feature that BIG-IP uses to direct incoming web traffic) are written in. Certain coding practices allow attackers to inject arbitrary Tcl commands, which could be executed in the security context of the target Tcl script.
Ransomware turns its sights on large organizations
Detections of ransomware aimed at businesses rose by a massive 363 percent between the second quarter of 2018 and the same period this year. Meanwhile consumer ransomware is down 34 percent.
The latest quarterly threat report from Malwarebytes also sees a 235 percent overall increase in threats aimed at organizations from enterprises to small businesses, with ransomware as a major contributor.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.