Ian Barker

Emotet botnet down for maintenance

Maintenance workers

June's Global Threat Index from Check Point reveals that the botnet behind the Emotet banking Trojan has been inactive for most of the month.

Check Point's researchers believe that Emotet's infrastructure could be offline for maintenance and upgrade operations, and that as soon as its servers are up and running again, it will be reactivated with new, enhanced threat capabilities.

Continue reading

Managing third-party risk costs the healthcare industry over $23 billion a year

Screen and stethoscope

The ability to adequately assess and understand the risks that vendors pose is a problem for healthcare providers, and a costly one at that, according to a new report.

The study by risk management platform Censinet and the Ponemon Institute  shows the yearly hidden cost of managing vendor risk is $3.8 million per healthcare provider, higher than the $2.9 million that each data breach costs providers. This adds up to a total cost across the industry of $23.7 billion.

Continue reading

It's 2029, you're paying more to read this page at peak time (and we're paying your ISP to stop you visiting other tech sites)

hacker laptop

What would a world be like where ISPs and businesses are in control of everything you see and do online? A world, in other words, without net neutrality.

VPN comparison site TheBestVPN.com has been considering this and has created an interactive simulator looking at what the web without net neutrality could look like in 2029.

Continue reading

Financial services businesses at high risk of mobile attacks

Mobile cash

Financial services are at greater risk of phishing and man-in-the-middle attacks on mobile devices than businesses in other industries according to a new report.

The study from mobile security specialist Wandera analyzed mobile device data from 225 financial services customers and reveals financial services organizations are experiencing a higher volume of phishing attacks than their peers in other sectors (57 percent compared to 42 percent cross-industry).

Continue reading

Cyber incidents cost $45 billion in 2018

Lock and money


Cybercriminals are getting better at monetizing their activities, with more than two million cyber incidents in 2018 resulting in over $45 billion in losses, with actual numbers expected to be much higher as many cyber incidents are never reported.

The Internet Society's Online Trust Alliance (OTA) has released a report which finds the financial impact of ransomware rose by 60 percent last year, and losses from business email compromise doubled, despite the fact that overall breaches and exposed records were down.

Continue reading

Seven out of 10 Brits want tougher penalties for breaching privacy rules

Data privacy

According to a new survey carried out by YouGov for data privacy company myGaru 71 percent of of UK adults want to see tougher action in penalizing companies that abuse data privacy by misusing third party data.

Around a third of the public (34 percent) have already made changes to the privacy settings of one or more of their social media accounts since the Cambridge Analytica Facebook scandal and 19 percent say they would make more or new changes in the future.

Continue reading

Companies turn to instant messaging in response to rising email threats

Email fraud

In a new study of IT decision makers by Barracuda Network, 94 percent of participants admit that email is still the most vulnerable part of their organization's cyber security.

The survey of 280 decision makers focused on the email threat landscape and email security practises. It discovered that 75 percent have been hit with brand impersonation emails, the largest threat as identified in the survey with ransomware coming in second on 47 percent.

Continue reading

Poor management of data harms businesses' ability to gain value from it

data magnifier

Less than 40 percent of companies in Europe, the Middle East and Africa (EMEA) are confident they can manage, secure and gain insight from data, and use it responsibly according to new research from Oracle.

The study finds that on average 42 percent of respondents do not have a data management strategy in place. Only 35 percent are highly confident they can manage data to generate meaningful insights, and key departments are still not accepting both accountability and responsibility for data management. In addition data security protocols are often not understood, or followed.

Continue reading

Second screens could be dragging down corporate networks

Having a second monitor is a great way of improving your productivity, but new research from network solutions company Gigamon suggests this could also be driving higher bandwidth consumption.

Of the 200+ IT professionals surveyed, 59 percent believe that second screens are, or could be, being used for non-work-related activity, like streaming music or watching videos.

Continue reading

Microsoft launches Threat and Vulnerability Management for enterprises

Microsoft building logo

Scheduled vulnerability scanning can leave blind spots between scans leaving organizations vulnerable.

In response to this problem, Microsoft has partnered with a number of enterprise customers to create a new Threat and Vulnerability Management solution as a built-in feature of Microsoft Defender Advanced Threat Protection.

Continue reading

UK gets an easier way to switch mobile providers

text message

If you've ever tried to switch mobile phone providers in the UK you'll know that if you want to keep your existing number after the transfer it involves getting a PAC (porting authorization code) from your old provider.

Obtaining this has in the past involved phoning them up and having them plead with you not to leave while offering you all kinds of special deals to persuade you to stay. Well not any more.

Continue reading

Exploring the ethics of AI

AI ethics graphic header

Artificial intelligence is appearing in more and more of our everyday technology. But it raises a number of questions about how it will react in challenging situations.

Security education comparison site Cyber Security Degrees has produced an infographic looking at the ethics of AI and how we feel about its impact on our lives.

Continue reading

A smart retro-look microphone for gaming or conferencing -- MXL AC-404-LED [Review]

MXL AC-404 microphone

We are increasingly using our PCs for communication, whether it's making Skype calls or just chatting to other online gamers.

But while laptops and some monitors have built in microphones they are not always ideally located or the best quality.

Continue reading

Is Google Safe Browsing falling short on mobile?

Chrome warning tape

Google has a pretty good record when it comes to protecting its users against online threats. Part of this is its Safe Browsing technology which scans billions of URLs each day to discover dangerous websites.

But research by mobile threat defense specialist Wandera has discovered a disparity between the protections available within Google’s desktop browser compared to its mobile browser.

Continue reading

New offering gives enterprises greater flexibility in security training

training key

Cybersecurity is often as much about people as it is about technology. But despite increasing their spending, organizations are still struggling to close the cybersecurity skills gap.

Training and certification company Offensive Security is launching a new program for enterprises designed to simplify the cybersecurity training process and allow organizations to invest more in cybersecurity skills development.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.